Cascading and Proxy Membership Inference Attacks Authors: Yuntao Du, Jiacheng Li, Yuetian Chen, Kaiyuan Zhang, Zhizhen Yuan, Hanshen Xiao, Bruno Ribeiro, Ninghui Li | Published: 2025-07-29 Poisoningメンバーシップ推定Evaluation Method 2025.07.29 2025.07.31 Literature Database
A Linear Approach to Data Poisoning Authors: Diego Granziol, Donald Flynn | Published: 2025-05-21 PoisoningDynamic AnalysisStatistical Analysis 2025.05.21 2025.05.28 Literature Database
One Shot Dominance: Knowledge Poisoning Attack on Retrieval-Augmented Generation Systems Authors: Zhiyuan Chang, Mingyang Li, Xiaojun Jia, Junjie Wang, Yuekai Huang, Ziyou Jiang, Yang Liu, Qing Wang | Published: 2025-05-15 | Updated: 2025-05-20 Poisoning attack on RAGPoisoningPoisoning Attack 2025.05.15 2025.05.28 Literature Database
Toward Malicious Clients Detection in Federated Learning Authors: Zhihao Dou, Jiaqi Wang, Wei Sun, Zhuqing Liu, Minghong Fang | Published: 2025-05-14 Trigger DetectionPoisoning悪意のあるクライアント検出 2025.05.14 2025.05.28 Literature Database
Analysis of the vulnerability of machine learning regression models to adversarial attacks using data from 5G wireless networks Authors: Leonid Legashev, Artur Zhigalov, Denis Parfenov | Published: 2025-05-01 Backdoor AttackPoisoningAttack Type 2025.05.01 2025.05.27 Literature Database
Data Encryption Battlefield: A Deep Dive into the Dynamic Confrontations in Ransomware Attacks Authors: Arash Mahboubi, Hamed Aboutorab, Seyit Camtepe, Hang Thanh Bui, Khanh Luong, Keyvan Ansari, Shenlu Wang, Bazara Barry | Published: 2025-04-29 Online LearningPoisoningPerformance Evaluation 2025.04.29 2025.05.27 Literature Database
Optimizing ML Training with Metagradient Descent Authors: Logan Engstrom, Andrew Ilyas, Benjamin Chen, Axel Feldmann, William Moses, Aleksander Madry | Published: 2025-03-17 PoisoningSelection and Evaluation of Optimization AlgorithmsDeep Learning 2025.03.17 2025.05.27 Literature Database
Provably effective detection of effective data poisoning attacks Authors: Jonathan Gallagher, Yasaman Esfandiari, Callen MacPhee, Michael Warren | Published: 2025-01-21 Backdoor AttackPoisoningExperimental Validation 2025.01.21 2025.05.27 Literature Database
VerifBFL: Leveraging zk-SNARKs for A Verifiable Blockchained Federated Learning Authors: Ahmed Ayoub Bellachia, Mouhamed Amine Bouchiha, Yacine Ghamri-Doudane, Mourad Rabah | Published: 2025-01-08 Privacy ProtectionFrameworkPoisoning 2025.01.08 2025.05.27 Literature Database
Mingling with the Good to Backdoor Federated Learning Authors: Nuno Neves | Published: 2025-01-03 Backdoor AttackPoisoning 2025.01.03 2025.05.27 Literature Database