Byzantine-Resilient Federated PCA and Low Rank Column-wise Sensing Authors: Ankit Pratap Singh, Namrata Vaswani | Published: 2023-09-25 | Updated: 2024-08-09 PoisoningDimensionality Reduction MethodFederated Learning 2023.09.25 2025.05.28 Literature Database
Deep Nonparametric Convexified Filtering for Computational Photography, Image Synthesis and Adversarial Defense Authors: Jianqiao Wangni | Published: 2023-09-13 | Updated: 2023-09-14 WatermarkingPoisoningDeep Learning Method 2023.09.13 2025.05.28 Literature Database
Sample Complexity of Robust Learning against Evasion Attacks Authors: Pascale Gourdeau | Published: 2023-08-23 Sample ComplexityPoisoningAdversarial Example 2023.08.23 2025.05.28 Literature Database
Protect Federated Learning Against Backdoor Attacks via Data-Free Trigger Generation Authors: Yanxin Yang, Ming Hu, Yue Cao, Jun Xia, Yihao Huang, Yang Liu, Mingsong Chen | Published: 2023-08-22 Backdoor AttackPoisoningDefense Method 2023.08.22 2025.05.28 Literature Database
Test-Time Poisoning Attacks Against Test-Time Adaptation Models Authors: Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang | Published: 2023-08-16 PoisoningModel Performance EvaluationAttack Evaluation 2023.08.16 2025.05.28 Literature Database
A Review of Adversarial Attacks in Computer Vision Authors: Yutong Zhang, Yao Li, Yin Li, Zhichang Guo | Published: 2023-08-15 PoisoningAdversarial Attack MethodsDefense Method 2023.08.15 2025.05.28 Literature Database
A Survey on Decentralized Federated Learning Authors: Edoardo Gabrielli, Giovanni Pica, Gabriele Tolomei | Published: 2023-08-08 Data Protection MethodIntegration of Blockchain and FLPoisoning 2023.08.08 2025.05.28 Literature Database
Breaking Speaker Recognition with PaddingBack Authors: Zhe Ye, Diqun Yan, Li Dong, Kailai Shen | Published: 2023-08-08 | Updated: 2024-03-11 WatermarkingBackdoor AttackPoisoning 2023.08.08 2025.05.28 Literature Database
When Federated Learning meets Watermarking: A Comprehensive Overview of Techniques for Intellectual Property Protection Authors: Mohammed Lansari, Reda Bellafqira, Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Gouenou Coatrieux | Published: 2023-08-07 WatermarkingData Protection MethodPoisoning 2023.08.07 2025.05.28 Literature Database
Label Inference Attacks against Node-level Vertical Federated GNNs Authors: Marco Arazzi, Mauro Conti, Stefanos Koffas, Marina Krcek, Antonino Nocera, Stjepan Picek, Jing Xu | Published: 2023-08-04 | Updated: 2024-04-18 PoisoningAdversarial Attack MethodsFederated Learning 2023.08.04 2025.05.28 Literature Database