MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack Authors: Jiayi Hua, Kailong Wang, Meizhen Wang, Guangdong Bai, Xiapu Luo, Haoyu Wang | Published: 2024-01-05 Backdoor AttackMalware ClassificationModel Performance Evaluation 2024.01.05 2025.05.27 Literature Database
FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks Authors: Marc Vucovich, Devin Quinn, Kevin Choi, Christopher Redino, Abdul Rahman, Edward Bowen | Published: 2023-12-04 Backdoor AttackMalicious ClientFederated Learning 2023.12.04 2025.05.28 Literature Database
Understanding Variation in Subpopulation Susceptibility to Poisoning Attacks Authors: Evan Rose, Fnu Suya, David Evans | Published: 2023-11-20 Subpopulation CharacteristicsBackdoor AttackPoisoning Attack 2023.11.20 2025.05.28 Literature Database
TextGuard: Provable Defense against Backdoor Attacks on Text Classification Authors: Hengzhi Pei, Jinyuan Jia, Wenbo Guo, Bo Li, Dawn Song | Published: 2023-11-19 | Updated: 2023-11-25 Text Generation MethodBackdoor AttackPoisoning 2023.11.19 2025.05.28 Literature Database
Stealthy and Persistent Unalignment on Large Language Models via Backdoor Injections Authors: Yuanpu Cao, Bochuan Cao, Jinghui Chen | Published: 2023-11-15 | Updated: 2024-06-09 Backdoor AttackPrompt Injection 2023.11.15 2025.05.28 Literature Database
Label Poisoning is All You Need Authors: Rishi D. Jha, Jonathan Hayase, Sewoong Oh | Published: 2023-10-29 Security AnalysisBackdoor AttackClassification of Malicious Actors 2023.10.29 2025.05.28 Literature Database
On the Detection of Image-Scaling Attacks in Machine Learning Authors: Erwin Quiring, Andreas Müller, Konrad Rieck | Published: 2023-10-23 Backdoor AttackAdversarial Attack DetectionAnalysis of Detection Methods 2023.10.23 2025.05.28 Literature Database
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks Authors: Jorge Castillo, Phillip Rieger, Hossein Fereidooni, Qian Chen, Ahmad Sadeghi | Published: 2023-10-03 Backdoor AttackPrivacy ProtectionPoisoning 2023.10.03 2025.05.28 Literature Database
Protect Federated Learning Against Backdoor Attacks via Data-Free Trigger Generation Authors: Yanxin Yang, Ming Hu, Yue Cao, Jun Xia, Yihao Huang, Yang Liu, Mingsong Chen | Published: 2023-08-22 Backdoor AttackPoisoningDefense Method 2023.08.22 2025.05.28 Literature Database
SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection Authors: João Vitorino, Isabel Praça, Eva Maia | Published: 2023-08-13 Backdoor AttackAdversarial TrainingDefense Method 2023.08.13 2025.05.28 Literature Database