On the Exploitability of Instruction Tuning Authors: Manli Shu, Jiongxiao Wang, Chen Zhu, Jonas Geiping, Chaowei Xiao, Tom Goldstein | Published: 2023-06-28 | Updated: 2023-10-28 Prompt InjectionPoisoningAdversarial Attack Detection 2023.06.28 2025.05.28 Literature Database
Towards Sybil Resilience in Decentralized Learning Authors: Thomas Werthenbach, Johan Pouwelse | Published: 2023-06-26 PoisoningPoisoning AttackFederated Learning 2023.06.26 2025.05.28 Literature Database
Boosting Model Inversion Attacks with Adversarial Examples Authors: Shuai Zhou, Tianqing Zhu, Dayong Ye, Xin Yu, Wanlei Zhou | Published: 2023-06-24 PoisoningAdversarial ExampleAdversarial attack 2023.06.24 2025.05.28 Literature Database
Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses Authors: Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas Cordeiro, Merouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo | Published: 2023-06-17 | Updated: 2024-02-08 Backdoor AttackPoisoningFederated Learning 2023.06.17 2025.05.28 Literature Database
Query-Free Evasion Attacks Against Machine Learning-Based Malware Detectors with Generative Adversarial Networks Authors: Daniel Gibert, Jordi Planes, Quan Le, Giulio Zizzo | Published: 2023-06-16 PoisoningMalware Propagation MeansAdversarial Spectrum Attack Detection 2023.06.16 2025.05.28 Literature Database
Fairness and Privacy-Preserving in Federated Learning: A Survey Authors: Taki Hasan Rafi, Faiza Anan Noor, Tahmid Hussain, Dong-Kyu Chae | Published: 2023-06-14 | Updated: 2023-07-14 Privacy TechniquePoisoningFederated Learning 2023.06.14 2025.05.28 Literature Database
Theoretical Foundations of Adversarially Robust Learning Authors: Omar Montasser | Published: 2023-06-13 PoisoningRobustness EvaluationAdversarial Example 2023.06.13 2025.05.28 Literature Database
SRATTA : Sample Re-ATTribution Attack of Secure Aggregation in Federated Learning Authors: Tanguy Marchand, Régis Loeb, Ulysse Marteau-Ferey, Jean Ogier du Terrail, Arthur Pignet | Published: 2023-06-13 PoisoningMalicious ClientFederated Learning 2023.06.13 2025.05.28 Literature Database
FheFL: Fully Homomorphic Encryption Friendly Privacy-Preserving Federated Learning with Byzantine Users Authors: Yogachandran Rahulamathavan, Charuka Herath, Xiaolan Liu, Sangarapillai Lambotharan, Carsten Maple | Published: 2023-06-08 | Updated: 2024-10-06 PoisoningMulti-Party ComputationFederated Learning 2023.06.08 2025.05.28 Literature Database
A Survey on Federated Learning Poisoning Attacks and Defenses Authors: Junchuan Lianga, Rong Wang, Chaosheng Feng, Chin-Chen Chang | Published: 2023-06-06 Backdoor AttackPoisoningUntargeted Toxicity Attack 2023.06.06 2025.05.28 Literature Database