Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning Authors: Deniz Koyuncu, Alex Gittens, Bülent Yener, Moti Yung | Published: 2023-05-31 Backdoor AttackAdversarial attackCausal Discovery Using Missing Data 2023.05.31 2025.05.28 Literature Database
Attacks on Online Learners: a Teacher-Student Analysis Authors: Riccardo Giuseppe Margiotta, Sebastian Goldt, Guido Sanguinetti | Published: 2023-05-18 | Updated: 2023-10-29 Backdoor AttackReinforcement LearningAdversarial Example 2023.05.18 2025.05.28 Literature Database
Security and Privacy Problems in Voice Assistant Applications: A Survey Authors: Jingjin Li, Chao chen, Lei Pan, Mostafa Rahimi Azghadi, Hossein Ghodosi, Jun Zhang | Published: 2023-04-19 Backdoor AttackPrivacy AnalysisSpeech Recognition Process 2023.04.19 2025.05.28 Literature Database
BadVFL: Backdoor Attacks in Vertical Federated Learning Authors: Mohammad Naseri, Yufei Han, Emiliano De Cristofaro | Published: 2023-04-18 | Updated: 2023-08-23 Backdoor AttackLabel Inference Attack 2023.04.18 2025.05.28 Literature Database
Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators Authors: Hongye Xu, Dongfang Liu, Cory Merkel, Michael Zuzak | Published: 2023-04-12 | Updated: 2023-04-14 DNN IP Protection MethodWatermarkingBackdoor Attack 2023.04.12 2025.05.28 Literature Database
Rethinking the Trigger-injecting Position in Graph Backdoor Attack Authors: Jing Xu, Gorka Abad, Stjepan Picek | Published: 2023-04-05 | Updated: 2023-04-18 Graph Neural NetworkBackdoor AttackFeature Selection Method 2023.04.05 2025.05.28 Literature Database
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective Authors: Baoyuan Wu, Zihao Zhu, Li Liu, Qingshan Liu, Zhaofeng He, Siwei Lyu | Published: 2023-02-19 | Updated: 2024-01-04 Backdoor AttackPrompt InjectionPoisoning Attack 2023.02.19 2025.05.28 Literature Database
Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness Authors: Bao Gia Doan, Shuiqiao Yang, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2023-01-30 Backdoor AttackBayesian Adversarial LearningPoisoning 2023.01.30 2025.05.28 Literature Database
Backdoor Attacks in Peer-to-Peer Federated Learning Authors: Georgios Syros, Gokberk Yar, Simona Boboila, Cristina Nita-Rotaru, Alina Oprea | Published: 2023-01-23 | Updated: 2024-09-17 Backdoor AttackPoisoningClassification of Malicious Actors 2023.01.23 2025.05.28 Literature Database
Towards Understanding How Self-training Tolerates Data Backdoor Poisoning Authors: Soumyadeep Pal, Ren Wang, Yuguang Yao, Sijia Liu | Published: 2023-01-20 Backdoor AttackPoisoningSelf-Learning Method 2023.01.20 2025.05.28 Literature Database