A New Ensemble Adversarial Attack Powered by Long-term Gradient Memories Authors: Zhaohui Che, Ali Borji, Guangtao Zhai, Suiyi Ling, Jing Li, Patrick Le Callet | Published: 2019-11-18 Backdoor AttackModel Performance EvaluationAdversarial Attack Methods 2019.11.18 2025.05.28 Literature Database
Robust Anomaly Detection and Backdoor Attack Detection Via Differential Privacy Authors: Min Du, Ruoxi Jia, Dawn Song | Published: 2019-11-16 Backdoor AttackPrivacy-Preserving Data MiningExperimental Validation 2019.11.16 2025.05.28 Literature Database
Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things Authors: Maede Zolanvari, Marcio A. Teixeira, Lav Gupta, Khaled M. Khan, Raj Jain | Published: 2019-11-13 Backdoor AttackDiscussion on Protocol Vulnerabilities and Attack ScenariosAttacker Behavior Analysis 2019.11.13 2025.05.28 Literature Database
Eavesdrop the Composition Proportion of Training Labels in Federated Learning Authors: Lixu Wang, Shichao Xu, Xiao Wang, Qi Zhu | Published: 2019-10-14 | Updated: 2019-10-27 Backdoor AttackPoisoningAttack Evaluation 2019.10.14 2025.05.28 Literature Database
Defending Neural Backdoors via Generative Distribution Modeling Authors: Ximing Qiao, Yukun Yang, Hai Li | Published: 2019-10-10 | Updated: 2019-11-06 Backdoor AttackAttack EvaluationGenerative Adversarial Network 2019.10.10 2025.05.28 Literature Database
Detecting AI Trojans Using Meta Neural Analysis Authors: Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li | Published: 2019-10-08 | Updated: 2020-10-01 Backdoor AttackPoisoningAttack Evaluation 2019.10.08 2025.05.28 Literature Database
An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack Authors: Yang Zhang, Shiyu Chang, Mo Yu, Kaizhi Qian | Published: 2019-10-01 Backdoor AttackModel Design and AccuracyAdversarial Attack Methods 2019.10.01 2025.05.28 Literature Database
Hidden Trigger Backdoor Attacks Authors: Aniruddha Saha, Akshayvarun Subramanya, Hamed Pirsiavash | Published: 2019-09-30 | Updated: 2019-12-21 Training Data GenerationBackdoor AttackAdversarial attack 2019.09.30 2025.05.28 Literature Database
Deep k-NN Defense against Clean-label Data Poisoning Attacks Authors: Neehar Peri, Neal Gupta, W. Ronny Huang, Liam Fowl, Chen Zhu, Soheil Feizi, Tom Goldstein, John P. Dickerson | Published: 2019-09-29 | Updated: 2020-08-13 Backdoor AttackPerformance EvaluationDetection of Poisonous Data 2019.09.29 2025.05.28 Literature Database
Detection of Backdoors in Trained Classifiers Without Access to the Training Set Authors: Zhen Xiang, David J. Miller, George Kesidis | Published: 2019-08-27 | Updated: 2020-08-19 Backdoor AttackAttack TypeAdversarial Attack Detection 2019.08.27 2025.05.28 Literature Database