A Backdoor Approach with Inverted Labels Using Dirty Label-Flipping Attacks Authors: Orson Mengara | Published: 2024-03-29 | Updated: 2024-04-07 Dataset GenerationBackdoor AttackPoisoning 2024.03.29 2025.05.27 Literature Database
Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency Authors: Soumyadeep Pal, Yuguang Yao, Ren Wang, Bingquan Shen, Sijia Liu | Published: 2024-03-15 WatermarkingBackdoor AttackPoisoning 2024.03.15 2025.05.27 Literature Database
Interactive Trimming against Evasive Online Data Manipulation Attacks: A Game-Theoretic Approach Authors: Yue Fu, Qingqing Ye, Rong Du, Haibo Hu | Published: 2024-03-15 Backdoor AttackPrivacy Protection MethodStrategic Game 2024.03.15 2025.05.27 Literature Database
Machine Unlearning: Taxonomy, Metrics, Applications, Challenges, and Prospects Authors: Na Li, Chunyi Zhou, Yansong Gao, Hui Chen, Anmin Fu, Zhi Zhang, Yu Shui | Published: 2024-03-13 Backdoor AttackMembership InferenceMachine Unlearning 2024.03.13 2025.05.27 Literature Database
Poisoning Programs by Un-Repairing Code: Security Concerns of AI-generated Code Authors: Cristina Improta | Published: 2024-03-11 Security AnalysisBackdoor AttackPoisoning 2024.03.11 2025.05.27 Literature Database
Fake or Compromised? Making Sense of Malicious Clients in Federated Learning Authors: Hamid Mozaffari, Sunav Choudhary, Amir Houmansadr | Published: 2024-03-10 Backdoor AttackPoisoningMalicious Client 2024.03.10 2025.05.27 Literature Database
On Protecting the Data Privacy of Large Language Models (LLMs): A Survey Authors: Biwei Yan, Kun Li, Minghui Xu, Yueyan Dong, Yue Zhang, Zhaochun Ren, Xiuzhen Cheng | Published: 2024-03-08 | Updated: 2024-03-14 Backdoor AttackPrivacy Protection MethodPrompt Injection 2024.03.08 2025.05.27 Literature Database
Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees Authors: Ehsan Nowroozi, Nada Jadalla, Samaneh Ghelichkhani, Alireza Jolfaei | Published: 2024-03-05 Backdoor AttackPoisoningDefense Method 2024.03.05 2025.05.27 Literature Database
Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks Authors: Ehsan Nowroozi, Imran Haider, Rahim Taheri, Mauro Conti | Published: 2024-03-05 Backdoor AttackPoisoningFederated Learning 2024.03.05 2025.05.27 Literature Database
Teach LLMs to Phish: Stealing Private Information from Language Models Authors: Ashwinee Panda, Christopher A. Choquette-Choo, Zhengming Zhang, Yaoqing Yang, Prateek Mittal | Published: 2024-03-01 Backdoor AttackPhishing DetectionPrompt Injection 2024.03.01 2025.05.27 Literature Database