Backdoor Attack

MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack

Authors: Jiayi Hua, Kailong Wang, Meizhen Wang, Guangdong Bai, Xiapu Luo, Haoyu Wang | Published: 2024-01-05
Backdoor Attack
Malware Classification
Model Performance Evaluation

FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks

Authors: Marc Vucovich, Devin Quinn, Kevin Choi, Christopher Redino, Abdul Rahman, Edward Bowen | Published: 2023-12-04
Backdoor Attack
Malicious Client
Federated Learning

Understanding Variation in Subpopulation Susceptibility to Poisoning Attacks

Authors: Evan Rose, Fnu Suya, David Evans | Published: 2023-11-20
Subpopulation Characteristics
Backdoor Attack
Poisoning Attack

TextGuard: Provable Defense against Backdoor Attacks on Text Classification

Authors: Hengzhi Pei, Jinyuan Jia, Wenbo Guo, Bo Li, Dawn Song | Published: 2023-11-19 | Updated: 2023-11-25
Text Generation Method
Backdoor Attack
Poisoning

Stealthy and Persistent Unalignment on Large Language Models via Backdoor Injections

Authors: Yuanpu Cao, Bochuan Cao, Jinghui Chen | Published: 2023-11-15 | Updated: 2024-06-09
Backdoor Attack
Prompt Injection

Label Poisoning is All You Need

Authors: Rishi D. Jha, Jonathan Hayase, Sewoong Oh | Published: 2023-10-29
Security Analysis
Backdoor Attack
Classification of Malicious Actors

On the Detection of Image-Scaling Attacks in Machine Learning

Authors: Erwin Quiring, Andreas Müller, Konrad Rieck | Published: 2023-10-23
Backdoor Attack
Adversarial Attack Detection
Analysis of Detection Methods

FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks

Authors: Jorge Castillo, Phillip Rieger, Hossein Fereidooni, Qian Chen, Ahmad Sadeghi | Published: 2023-10-03
Backdoor Attack
Privacy Protection
Poisoning

Protect Federated Learning Against Backdoor Attacks via Data-Free Trigger Generation

Authors: Yanxin Yang, Ming Hu, Yue Cao, Jun Xia, Yihao Huang, Yang Liu, Mingsong Chen | Published: 2023-08-22
Backdoor Attack
Poisoning
Defense Method

SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection

Authors: João Vitorino, Isabel Praça, Eva Maia | Published: 2023-08-13
Backdoor Attack
Adversarial Training
Defense Method