Get a Model! Model Hijacking Attack Against Machine Learning Models Authors: Ahmed Salem, Michael Backes, Yang Zhang | Published: 2021-11-08 Dataset evaluationBackdoor AttackAdversarial Attack Methods 2021.11.08 2025.05.28 Literature Database
Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks Authors: Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao | Published: 2021-10-13 | Updated: 2022-06-15 Backdoor AttackForensic ReportAdversarial Attack Methods 2021.10.13 2025.05.28 Literature Database
Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication Authors: Elliu Huang, Fabio Di Troia, Mark Stamp | Published: 2021-10-03 Backdoor AttackAdversarial TrainingDeep Learning Method 2021.10.03 2025.05.28 Literature Database
Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks Authors: Kaleel Mahmood, Rigel Mahmood, Ethan Rathbun, Marten van Dijk | Published: 2021-09-29 Backdoor AttackPoisoningAdversarial attack 2021.09.29 2025.05.28 Literature Database
DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated Learning Authors: Md Tamjid Hossain, Shafkat Islam, Shahriar Badsha, Haoting Shen | Published: 2021-09-21 Backdoor AttackFederated LearningDefense Mechanism 2021.09.21 2025.05.28 Literature Database
Excess Capacity and Backdoor Poisoning Authors: Naren Sarayu Manoj, Avrim Blum | Published: 2021-09-02 | Updated: 2021-11-03 Data Contamination DetectionBackdoor AttackAdversarial Example 2021.09.02 2025.05.28 Literature Database
Machine Unlearning of Features and Labels Authors: Alexander Warnecke, Lukas Pirch, Christian Wressnegger, Konrad Rieck | Published: 2021-08-26 | Updated: 2023-08-07 Backdoor AttackPoisoningMachine Learning Method 2021.08.26 2025.05.28 Literature Database
Advances in adversarial attacks and defenses in computer vision: A survey Authors: Naveed Akhtar, Ajmal Mian, Navid Kardan, Mubarak Shah | Published: 2021-08-01 | Updated: 2021-09-02 Backdoor AttackRobustnessAdversarial Example 2021.08.01 2025.05.28 Literature Database
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers Authors: Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek | Published: 2021-07-30 | Updated: 2022-03-06 Backdoor AttackAdversarial attackSecurity of Voice Recognition Systems 2021.07.30 2025.05.28 Literature Database
Accumulative Poisoning Attacks on Real-time Data Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Hang Su, Jun Zhu | Published: 2021-06-18 | Updated: 2021-10-26 Online LearningBackdoor AttackFederated Learning 2021.06.18 2025.05.28 Literature Database