Backdoor Attack

Federated Unlearning: How to Efficiently Erase a Client in FL?

Authors: Anisa Halimi, Swanand Kadhe, Ambrish Rawat, Nathalie Baracaldo | Published: 2022-07-12 | Updated: 2023-10-20
Client Data Deletion
Backdoor Attack
Model Performance Evaluation

Ransomware Classification and Detection With Machine Learning Algorithms

Authors: Mohammad Masum, Md Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan | Published: 2022-07-02
Backdoor Attack
Dynamic Analysis
Evaluation Method

A Deep Learning Approach to Create DNS Amplification Attacks

Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik, Cory Nance | Published: 2022-06-29
Algorithm Design
Backdoor Attack
Adversarial Attack Detection

Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems

Authors: Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo | Published: 2022-05-31 | Updated: 2022-08-12
Attack Methods against DFL
Backdoor Attack
User Activity Analysis

SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning

Authors: Harsh Chaudhari, Matthew Jagielski, Alina Oprea | Published: 2022-05-20 | Updated: 2022-09-08
Backdoor Attack
Membership Inference
Robustness Evaluation

Backdoor Attacks on Bayesian Neural Networks using Reverse Distribution

Authors: Zhixin Pan, Prabhat Mishra | Published: 2022-05-18
Attack Methods against DFL
Backdoor Attack
Performance Evaluation

Backdooring Explainable Machine Learning

Authors: Maximilian Noppel, Lukas Peter, Christian Wressnegger | Published: 2022-04-20
Backdoor Attack
Attack Type
Explainability

Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems

Authors: Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique | Published: 2022-04-18
Backdoor Attack
Membership Inference
Defense Method

An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks

Authors: Xinqiao Zhang, Huili Chen, Ke Huang, Farinaz Koushanfar | Published: 2022-04-08
Trojan Horse Signature
Trojan Detection
Backdoor Attack

Breaking the De-Pois Poisoning Defense

Authors: Alaa Anani, Mohamed Ghanem, Lotfy Abdel Khaliq | Published: 2022-04-03
Backdoor Attack
Poisoning
Defense Method