Model-Targeted Poisoning Attacks with Provable Convergence Authors: Fnu Suya, Saeed Mahloujifar, Anshuman Suri, David Evans, Yuan Tian | Published: 2020-06-30 | Updated: 2021-04-21 Backdoor AttackPoisoningAttack Scenario Analysis 2020.06.30 2025.05.28 Literature Database
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods? Authors: Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu | Published: 2020-06-26 | Updated: 2022-07-28 Backdoor AttackAdversarial Example DetectionAdversarial attack 2020.06.26 2025.05.28 Literature Database
Subpopulation Data Poisoning Attacks Authors: Matthew Jagielski, Giorgio Severi, Niklas Pousette Harger, Alina Oprea | Published: 2020-06-24 | Updated: 2021-05-12 Backdoor AttackPoisoningPoisoning Attack 2020.06.24 2025.05.28 Literature Database
Backdoor Attacks to Graph Neural Networks Authors: Zaixi Zhang, Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong | Published: 2020-06-19 | Updated: 2021-12-17 Backdoor DetectionBackdoor AttackDefense Method 2020.06.19 2025.05.28 Literature Database
Backdoor Attacks on Federated Meta-Learning Authors: Chien-Lun Chen, Leana Golubchik, Marco Paolieri | Published: 2020-06-12 | Updated: 2020-12-16 Backdoor AttackPoisoningFederated Learning 2020.06.12 2025.05.28 Literature Database
Backdoors in Neural Models of Source Code Authors: Goutham Ramakrishnan, Aws Albarghouthi | Published: 2020-06-11 Backdoor AttackProgram AnalysisPoisoning 2020.06.11 2025.05.28 Literature Database
Backdoor Smoothing: Demystifying Backdoor Attacks on Deep Neural Networks Authors: Kathrin Grosse, Taesung Lee, Battista Biggio, Youngja Park, Michael Backes, Ian Molloy | Published: 2020-06-11 | Updated: 2021-11-02 Backdoor AttackPerformance EvaluationAttack Scenario Analysis 2020.06.11 2025.05.28 Literature Database
Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability Authors: Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna | Published: 2020-05-01 | Updated: 2021-03-14 Backdoor AttackPoisoningDefense Effectiveness Analysis 2020.05.01 2025.05.28 Literature Database
Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness Authors: Pu Zhao, Pin-Yu Chen, Payel Das, Karthikeyan Natesan Ramamurthy, Xue Lin | Published: 2020-04-30 | Updated: 2020-07-03 Backdoor AttackPoisoningRobustness Improvement Method 2020.04.30 2025.05.28 Literature Database
Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classifiers Authors: Loc Truong, Chace Jones, Brian Hutchinson, Andrew August, Brenda Praggastis, Robert Jasper, Nicole Nichols, Aaron Tuor | Published: 2020-04-24 Backdoor AttackRobustness AnalysisRegularization 2020.04.24 2025.05.28 Literature Database