Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks Authors: Kaleel Mahmood, Rigel Mahmood, Ethan Rathbun, Marten van Dijk | Published: 2021-09-29 Backdoor AttackPoisoningAdversarial attack 2021.09.29 2025.05.28 Literature Database
DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated Learning Authors: Md Tamjid Hossain, Shafkat Islam, Shahriar Badsha, Haoting Shen | Published: 2021-09-21 Backdoor AttackFederated LearningDefense Mechanism 2021.09.21 2025.05.28 Literature Database
Excess Capacity and Backdoor Poisoning Authors: Naren Sarayu Manoj, Avrim Blum | Published: 2021-09-02 | Updated: 2021-11-03 Data Contamination DetectionBackdoor AttackAdversarial Example 2021.09.02 2025.05.28 Literature Database
Machine Unlearning of Features and Labels Authors: Alexander Warnecke, Lukas Pirch, Christian Wressnegger, Konrad Rieck | Published: 2021-08-26 | Updated: 2023-08-07 Backdoor AttackPoisoningMachine Learning Method 2021.08.26 2025.05.28 Literature Database
Advances in adversarial attacks and defenses in computer vision: A survey Authors: Naveed Akhtar, Ajmal Mian, Navid Kardan, Mubarak Shah | Published: 2021-08-01 | Updated: 2021-09-02 Backdoor AttackRobustnessAdversarial Example 2021.08.01 2025.05.28 Literature Database
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers Authors: Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek | Published: 2021-07-30 | Updated: 2022-03-06 Backdoor AttackAdversarial attackSecurity of Voice Recognition Systems 2021.07.30 2025.05.28 Literature Database
Accumulative Poisoning Attacks on Real-time Data Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Hang Su, Jun Zhu | Published: 2021-06-18 | Updated: 2021-10-26 Online LearningBackdoor AttackFederated Learning 2021.06.18 2025.05.28 Literature Database
Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch Authors: Hossein Souri, Liam Fowl, Rama Chellappa, Micah Goldblum, Tom Goldstein | Published: 2021-06-16 | Updated: 2022-10-13 Backdoor AttackPoisoningMachine Learning 2021.06.16 2025.05.28 Literature Database
Stealthy Backdoors as Compression Artifacts Authors: Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans | Published: 2021-04-30 Backdoor AttackRisks of Model CompressionVulnerability Analysis 2021.04.30 2025.05.28 Literature Database
SPECTRE: Defending Against Backdoor Attacks Using Robust Statistics Authors: Jonathan Hayase, Weihao Kong, Raghav Somani, Sewoong Oh | Published: 2021-04-22 Backdoor AttackPoisoningPoisoning Attack 2021.04.22 2025.05.28 Literature Database