Protect Federated Learning Against Backdoor Attacks via Data-Free Trigger Generation Authors: Yanxin Yang, Ming Hu, Yue Cao, Jun Xia, Yihao Huang, Yang Liu, Mingsong Chen | Published: 2023-08-22 Backdoor AttackPoisoningDefense Method 2023.08.22 2025.05.28 Literature Database
SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection Authors: João Vitorino, Isabel Praça, Eva Maia | Published: 2023-08-13 Backdoor AttackAdversarial TrainingDefense Method 2023.08.13 2025.05.28 Literature Database
Breaking Speaker Recognition with PaddingBack Authors: Zhe Ye, Diqun Yan, Li Dong, Kailai Shen | Published: 2023-08-08 | Updated: 2024-03-11 WatermarkingBackdoor AttackPoisoning 2023.08.08 2025.05.28 Literature Database
Backdoor Federated Learning by Poisoning Backdoor-Critical Layers Authors: Haomin Zhuang, Mingxian Yu, Hao Wang, Yang Hua, Jian Li, Xu Yuan | Published: 2023-08-08 | Updated: 2024-04-15 Backdoor AttackPoisoning AttackDefense Method 2023.08.08 2025.05.28 Literature Database
Backdoor Attacks for In-Context Learning with Language Models Authors: Nikhil Kandpal, Matthew Jagielski, Florian Tramèr, Nicholas Carlini | Published: 2023-07-27 LLM SecurityBackdoor AttackPrompt Injection 2023.07.27 2025.05.28 Literature Database
Digital Healthcare in The Metaverse: Insights into Privacy and Security Authors: Mehdi Letafati, Safa Otoum | Published: 2023-07-22 | Updated: 2023-08-10 Data Protection MethodBackdoor AttackPrivacy Risk Management 2023.07.22 2025.05.28 Literature Database
Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples Authors: Shaokui Wei, Mingda Zhang, Hongyuan Zha, Baoyuan Wu | Published: 2023-07-20 Backdoor AttackAdversarial Attack MethodsWatermark Evaluation 2023.07.20 2025.05.28 Literature Database
Rethinking Backdoor Attacks Authors: Alaa Khaddaj, Guillaume Leclerc, Aleksandar Makelov, Kristian Georgiev, Hadi Salman, Andrew Ilyas, Aleksander Madry | Published: 2023-07-19 Data ObfuscationBackdoor AttackPoisoning 2023.07.19 2025.05.28 Literature Database
Application of BadNets in Spam Filters Authors: Swagnik Roychoudhury, Akshaj Kumar Veldanda | Published: 2023-07-18 LSTM Model Performance EvaluationBackdoor AttackImprovement of Learning 2023.07.18 2025.05.28 Literature Database
On Practical Aspects of Aggregation Defenses against Data Poisoning Attacks Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-06-28 Data Origins and EvolutionData Contamination DetectionBackdoor Attack 2023.06.28 2025.05.28 Literature Database