Backdoor Attack

Exploring Model Dynamics for Accumulative Poisoning Discovery

Authors: Jianing Zhu, Xiawei Guo, Jiangchao Yao, Chao Du, Li He, Shuo Yuan, Tongliang Liu, Liang Wang, Bo Han | Published: 2023-06-06
Backdoor Attack
Model Design and Accuracy
Adversarial attack

A Survey on Federated Learning Poisoning Attacks and Defenses

Authors: Junchuan Lianga, Rong Wang, Chaosheng Feng, Chin-Chen Chang | Published: 2023-06-06
Backdoor Attack
Poisoning
Untargeted Toxicity Attack

Poisoning Network Flow Classifiers

Authors: Giorgio Severi, Simona Boboila, Alina Oprea, John Holodnak, Kendra Kratkiewicz, Jason Matterer | Published: 2023-06-02
Backdoor Attack
Poisoning
Adversarial attack

Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning

Authors: Deniz Koyuncu, Alex Gittens, Bülent Yener, Moti Yung | Published: 2023-05-31
Backdoor Attack
Adversarial attack
Causal Discovery Using Missing Data

Attacks on Online Learners: a Teacher-Student Analysis

Authors: Riccardo Giuseppe Margiotta, Sebastian Goldt, Guido Sanguinetti | Published: 2023-05-18 | Updated: 2023-10-29
Backdoor Attack
Reinforcement Learning
Adversarial Example

Security and Privacy Problems in Voice Assistant Applications: A Survey

Authors: Jingjin Li, Chao chen, Lei Pan, Mostafa Rahimi Azghadi, Hossein Ghodosi, Jun Zhang | Published: 2023-04-19
Backdoor Attack
Privacy Analysis
Speech Recognition Process

BadVFL: Backdoor Attacks in Vertical Federated Learning

Authors: Mohammad Naseri, Yufei Han, Emiliano De Cristofaro | Published: 2023-04-18 | Updated: 2023-08-23
Backdoor Attack
Label Inference Attack

Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators

Authors: Hongye Xu, Dongfang Liu, Cory Merkel, Michael Zuzak | Published: 2023-04-12 | Updated: 2023-04-14
DNN IP Protection Method
Watermarking
Backdoor Attack

Rethinking the Trigger-injecting Position in Graph Backdoor Attack

Authors: Jing Xu, Gorka Abad, Stjepan Picek | Published: 2023-04-05 | Updated: 2023-04-18
Graph Neural Network
Backdoor Attack
Feature Selection Method

Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective

Authors: Baoyuan Wu, Zihao Zhu, Li Liu, Qingshan Liu, Zhaofeng He, Siwei Lyu | Published: 2023-02-19 | Updated: 2024-01-04
Backdoor Attack
Prompt Injection
Poisoning Attack