Adversarial Training for Deep Learning-based Intrusion Detection Systems Authors: Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees | Published: 2021-04-20 ML-Based IDSBackdoor AttackAdversarial Example 2021.04.20 2025.05.28 Literature Database
Defending Against Adversarial Denial-of-Service Data Poisoning Attacks Authors: Nicolas M. Müller, Simon Roschmann, Konstantin Böttinger | Published: 2021-04-14 | Updated: 2021-11-30 Backdoor AttackPoisoningPoisoning Attack 2021.04.14 2025.05.28 Literature Database
Black-box Detection of Backdoor Attacks with Limited Information and Data Authors: Yinpeng Dong, Xiao Yang, Zhijie Deng, Tianyu Pang, Zihao Xiao, Hang Su, Jun Zhu | Published: 2021-03-24 Backdoor AttackOptimization MethodsDefense Mechanism 2021.03.24 2025.05.28 Literature Database
TAD: Trigger Approximation based Black-box Trojan Detection for AI Authors: Xinqiao Zhang, Huili Chen, Farinaz Koushanfar | Published: 2021-02-03 | Updated: 2021-04-20 WatermarkingTrojan DetectionBackdoor Attack 2021.02.03 2025.05.28 Literature Database
Fast Training of Provably Robust Neural Networks by SingleProp Authors: Akhilan Boopathy, Tsui-Wei Weng, Sijia Liu, Pin-Yu Chen, Gaoyuan Zhang, Luca Daniel | Published: 2021-02-01 Backdoor AttackModel Performance EvaluationAdversarial Training 2021.02.01 2025.05.28 Literature Database
Active Learning Under Malicious Mislabeling and Poisoning Attacks Authors: Jing Lin, Ryan Luley, Kaiqi Xiong | Published: 2021-01-01 | Updated: 2021-09-02 Backdoor AttackPoisoningPerformance Evaluation 2021.01.01 2025.05.28 Literature Database
Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses Authors: Micah Goldblum, Dimitris Tsipras, Chulin Xie, Xinyun Chen, Avi Schwarzschild, Dawn Song, Aleksander Madry, Bo Li, Tom Goldstein | Published: 2020-12-18 | Updated: 2021-03-31 Backdoor AttackPoisoningModel Protection Methods 2020.12.18 2025.05.28 Literature Database
Certified Robustness of Nearest Neighbors against Data Poisoning and Backdoor Attacks Authors: Jinyuan Jia, Yupei Liu, Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2020-12-07 | Updated: 2021-12-02 Backdoor AttackAttack MethodMachine Learning 2020.12.07 2025.05.28 Literature Database
FAT: Federated Adversarial Training Authors: Giulio Zizzo, Ambrish Rawat, Mathieu Sinn, Beat Buesser | Published: 2020-12-03 Backdoor AttackPoisoningAdversarial Training 2020.12.03 2025.05.28 Literature Database
Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers Authors: Tzvika Shapira, David Berend, Ishai Rosenberg, Yang Liu, Asaf Shabtai, Yuval Elovici | Published: 2020-10-30 Backdoor AttackMalware DetectionContent Specialized for Toxicity Attacks 2020.10.30 2025.05.28 Literature Database