Weight Poisoning Attacks on Pre-trained Models Authors: Keita Kurita, Paul Michel, Graham Neubig | Published: 2020-04-14 Backdoor AttackPoisoningAdversarial Learning 2020.04.14 2025.05.28 Literature Database
MetaPoison: Practical General-purpose Clean-label Data Poisoning Authors: W. Ronny Huang, Jonas Geiping, Liam Fowl, Gavin Taylor, Tom Goldstein | Published: 2020-04-01 | Updated: 2021-02-21 Backdoor AttackPoisoningAdversarial Example 2020.04.01 2025.05.28 Literature Database
Adaptive Reward-Poisoning Attacks against Reinforcement Learning Authors: Xuezhou Zhang, Yuzhe Ma, Adish Singla, Xiaojin Zhu | Published: 2020-03-27 | Updated: 2020-06-22 Q-Learning AlgorithmBackdoor AttackReinforcement Learning Attack 2020.03.27 2025.05.28 Literature Database
RAB: Provable Robustness Against Backdoor Attacks Authors: Maurice Weber, Xiaojun Xu, Bojan Karlaš, Ce Zhang, Bo Li | Published: 2020-03-19 | Updated: 2023-08-03 Backdoor AttackRobustnessAdversarial Example 2020.03.19 2025.05.28 Literature Database
Towards Probabilistic Verification of Machine Unlearning Authors: David Marco Sommer, Liwei Song, Sameer Wagh, Prateek Mittal | Published: 2020-03-09 | Updated: 2020-12-01 Training MethodBackdoor AttackBackdoor Attack Mitigation 2020.03.09 2025.05.28 Literature Database
Towards Backdoor Attacks and Defense in Robust Machine Learning Models Authors: Ezekiel Soremekun, Sakshi Udeshi, Sudipta Chattopadhyay | Published: 2020-02-25 | Updated: 2023-01-11 Backdoor AttackPoisoningRobustness Evaluation 2020.02.25 2025.05.28 Literature Database
Label-Consistent Backdoor Attacks Authors: Alexander Turner, Dimitris Tsipras, Aleksander Madry | Published: 2019-12-05 | Updated: 2019-12-06 Backdoor AttackPoisoningAdversarial Example 2019.12.05 2025.05.28 Literature Database
Deep Probabilistic Models to Detect Data Poisoning Attacks Authors: Mahesh Subedar, Nilesh Ahuja, Ranganath Krishnan, Ibrahima J. Ndiour, Omesh Tickoo | Published: 2019-12-03 Backdoor AttackPoisoning AttackPerformance Evaluation 2019.12.03 2025.05.28 Literature Database
Failure Modes in Machine Learning Systems Authors: Ram Shankar Siva Kumar, David O Brien, Kendra Albert, Salomé Viljöen, Jeffrey Snover | Published: 2019-11-25 Backdoor AttackPrivacy ViolationAdversarial Example 2019.11.25 2025.05.28 Literature Database
Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic Authors: Zhen Xiang, David J. Miller, Hang Wang, George Kesidis | Published: 2019-11-18 | Updated: 2020-04-06 Detection and localization of DDIABackdoor AttackPoisoning 2019.11.18 2025.05.28 Literature Database