Efficient Availability Attacks against Supervised and Contrastive Learning Simultaneously Authors: Yihan Wang, Yifan Zhu, Xiao-Shan Gao | Published: 2024-02-06 Cyber AttackPoisoningAdversarial Training 2024.02.06 2025.05.27 Literature Database
Data Poisoning for In-context Learning Authors: Pengfei He, Han Xu, Yue Xing, Hui Liu, Makoto Yamada, Jiliang Tang | Published: 2024-02-03 | Updated: 2025-06-02 PoisoningPoisoning AttackDetection of Misinformation 2024.02.03 2025.06.04 Literature Database
Game-Theoretic Unlearnable Example Generator Authors: Shuang Liu, Yihan Wang, Xiao-Shan Gao | Published: 2024-01-31 WatermarkingBackdoor AttackPoisoning 2024.01.31 2025.05.27 Literature Database
Better Representations via Adversarial Training in Pre-Training: A Theoretical Perspective Authors: Yue Xing, Xiaofeng Lin, Qifan Song, Yi Xu, Belinda Zeng, Guang Cheng | Published: 2024-01-26 PoisoningAdversarial TrainingFeature Selection Method 2024.01.26 2025.05.27 Literature Database
Explainable and Transferable Adversarial Attack for ML-Based Network Intrusion Detectors Authors: Hangsheng Zhang, Dongqi Han, Yinlong Liu, Zhiliang Wang, Jiyan Sun, Shangyuan Zhuang, Jiqiang Liu, Jinsong Dong | Published: 2024-01-19 PoisoningModel InterpretabilityAdversarial attack 2024.01.19 2025.05.27 Literature Database
Vulnerabilities of Foundation Model Integrated Federated Learning Under Adversarial Threats Authors: Chen Wu, Xi Li, Jiaqi Wang | Published: 2024-01-18 | Updated: 2024-04-02 Prompt InjectionPoisoningFederated Learning 2024.01.18 2025.05.27 Literature Database
Towards Efficient and Certified Recovery from Poisoning Attacks in Federated Learning Authors: Yu Jiang, Jiyuan Shen, Ziyao Liu, Chee Wei Tan, Kwok-Yan Lam | Published: 2024-01-16 | Updated: 2024-01-19 PoisoningPoisoning AttackFederated Learning 2024.01.16 2025.05.27 Literature Database
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models Authors: Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang, Chenghu Zhou, Bo Li | Published: 2024-01-14 Privacy Protection MethodPoisoningWatermark Evaluation 2024.01.14 2025.05.27 Literature Database
Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning Authors: Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Radha Poovendran | Published: 2024-01-10 Byzantine ResiliencePoisoningFederated Learning 2024.01.10 2025.05.27 Literature Database
AIJack: Let’s Hijack AI! Security and Privacy Risk Simulator for Machine Learning Authors: Hideaki Takahashi | Published: 2023-12-29 | Updated: 2024-04-08 WatermarkingPoisoningFederated Learning 2023.12.29 2025.05.27 Literature Database