Backdoor Attack

Get a Model! Model Hijacking Attack Against Machine Learning Models

Authors: Ahmed Salem, Michael Backes, Yang Zhang | Published: 2021-11-08
Dataset evaluation
Backdoor Attack
Adversarial Attack Methods

Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks

Authors: Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao | Published: 2021-10-13 | Updated: 2022-06-15
Backdoor Attack
Forensic Report
Adversarial Attack Methods

Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication

Authors: Elliu Huang, Fabio Di Troia, Mark Stamp | Published: 2021-10-03
Backdoor Attack
Adversarial Training
Deep Learning Method

Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks

Authors: Kaleel Mahmood, Rigel Mahmood, Ethan Rathbun, Marten van Dijk | Published: 2021-09-29
Backdoor Attack
Poisoning
Adversarial attack

DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated Learning

Authors: Md Tamjid Hossain, Shafkat Islam, Shahriar Badsha, Haoting Shen | Published: 2021-09-21
Backdoor Attack
Federated Learning
Defense Mechanism

Excess Capacity and Backdoor Poisoning

Authors: Naren Sarayu Manoj, Avrim Blum | Published: 2021-09-02 | Updated: 2021-11-03
Data Contamination Detection
Backdoor Attack
Adversarial Example

Machine Unlearning of Features and Labels

Authors: Alexander Warnecke, Lukas Pirch, Christian Wressnegger, Konrad Rieck | Published: 2021-08-26 | Updated: 2023-08-07
Backdoor Attack
Poisoning
Machine Learning Method

Advances in adversarial attacks and defenses in computer vision: A survey

Authors: Naveed Akhtar, Ajmal Mian, Navid Kardan, Mubarak Shah | Published: 2021-08-01 | Updated: 2021-09-02
Backdoor Attack
Robustness
Adversarial Example

Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

Authors: Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek | Published: 2021-07-30 | Updated: 2022-03-06
Backdoor Attack
Adversarial attack
Security of Voice Recognition Systems

Accumulative Poisoning Attacks on Real-time Data

Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Hang Su, Jun Zhu | Published: 2021-06-18 | Updated: 2021-10-26
Online Learning
Backdoor Attack
Federated Learning