Machine Unlearning of Features and Labels Authors: Alexander Warnecke, Lukas Pirch, Christian Wressnegger, Konrad Rieck | Published: 2021-08-26 | Updated: 2023-08-07 Backdoor AttackPoisoningMachine Learning Method 2021.08.26 2025.05.28 Literature Database
Advances in adversarial attacks and defenses in computer vision: A survey Authors: Naveed Akhtar, Ajmal Mian, Navid Kardan, Mubarak Shah | Published: 2021-08-01 | Updated: 2021-09-02 Backdoor AttackRobustnessAdversarial Example 2021.08.01 2025.05.28 Literature Database
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers Authors: Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek | Published: 2021-07-30 | Updated: 2022-03-06 Backdoor AttackAdversarial attackSecurity of Voice Recognition Systems 2021.07.30 2025.05.28 Literature Database
Accumulative Poisoning Attacks on Real-time Data Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Hang Su, Jun Zhu | Published: 2021-06-18 | Updated: 2021-10-26 Online LearningBackdoor AttackFederated Learning 2021.06.18 2025.05.28 Literature Database
Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch Authors: Hossein Souri, Liam Fowl, Rama Chellappa, Micah Goldblum, Tom Goldstein | Published: 2021-06-16 | Updated: 2022-10-13 Backdoor AttackPoisoningMachine Learning 2021.06.16 2025.05.28 Literature Database
Stealthy Backdoors as Compression Artifacts Authors: Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans | Published: 2021-04-30 Backdoor AttackRisks of Model CompressionVulnerability Analysis 2021.04.30 2025.05.28 Literature Database
SPECTRE: Defending Against Backdoor Attacks Using Robust Statistics Authors: Jonathan Hayase, Weihao Kong, Raghav Somani, Sewoong Oh | Published: 2021-04-22 Backdoor AttackPoisoningPoisoning Attack 2021.04.22 2025.05.28 Literature Database
Adversarial Training for Deep Learning-based Intrusion Detection Systems Authors: Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees | Published: 2021-04-20 ML-Based IDSBackdoor AttackAdversarial Example 2021.04.20 2025.05.28 Literature Database
Defending Against Adversarial Denial-of-Service Data Poisoning Attacks Authors: Nicolas M. Müller, Simon Roschmann, Konstantin Böttinger | Published: 2021-04-14 | Updated: 2021-11-30 Backdoor AttackPoisoningPoisoning Attack 2021.04.14 2025.05.28 Literature Database
Black-box Detection of Backdoor Attacks with Limited Information and Data Authors: Yinpeng Dong, Xiao Yang, Zhijie Deng, Tianyu Pang, Zihao Xiao, Hang Su, Jun Zhu | Published: 2021-03-24 Backdoor AttackOptimization MethodsDefense Mechanism 2021.03.24 2025.05.28 Literature Database