Poisoning

Fairness and Privacy-Preserving in Federated Learning: A Survey

Authors: Taki Hasan Rafi, Faiza Anan Noor, Tahmid Hussain, Dong-Kyu Chae | Published: 2023-06-14 | Updated: 2023-07-14
Privacy Technique
Poisoning
Federated Learning

Theoretical Foundations of Adversarially Robust Learning

Authors: Omar Montasser | Published: 2023-06-13
Poisoning
Robustness Evaluation
Adversarial Example

SRATTA : Sample Re-ATTribution Attack of Secure Aggregation in Federated Learning

Authors: Tanguy Marchand, Régis Loeb, Ulysse Marteau-Ferey, Jean Ogier du Terrail, Arthur Pignet | Published: 2023-06-13
Poisoning
Malicious Client
Federated Learning

FheFL: Fully Homomorphic Encryption Friendly Privacy-Preserving Federated Learning with Byzantine Users

Authors: Yogachandran Rahulamathavan, Charuka Herath, Xiaolan Liu, Sangarapillai Lambotharan, Carsten Maple | Published: 2023-06-08 | Updated: 2024-10-06
Poisoning
Multi-Party Computation
Federated Learning

A Survey on Federated Learning Poisoning Attacks and Defenses

Authors: Junchuan Lianga, Rong Wang, Chaosheng Feng, Chin-Chen Chang | Published: 2023-06-06
Backdoor Attack
Poisoning
Untargeted Toxicity Attack

Poisoning Network Flow Classifiers

Authors: Giorgio Severi, Simona Boboila, Alina Oprea, John Holodnak, Kendra Kratkiewicz, Jason Matterer | Published: 2023-06-02
Backdoor Attack
Poisoning
Adversarial attack

Hyperparameter Learning under Data Poisoning: Analysis of the Influence of Regularization via Multiobjective Bilevel Optimization

Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2023-06-02 | Updated: 2023-06-23
Poisoning
Attack Evaluation
Regularization

Adversarial Robustness in Unsupervised Machine Learning: A Systematic Review

Authors: Mathias Lundteigen Mohus, Jinyue Li | Published: 2023-06-01
Privacy Protection Method
Poisoning
Adversarial Attack Methods

Constructing Semantics-Aware Adversarial Examples with a Probabilistic Perspective

Authors: Andi Zhang, Mingtian Zhang, Damon Wischik | Published: 2023-06-01 | Updated: 2024-11-24
Poisoning
Diffusion Model
Adversarial Attack Methods

RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense

Authors: Yue Cui, Syed Irfan Ali Meerza, Zhuohang Li, Luyang Liu, Jiaxin Zhang, Jian Liu | Published: 2023-04-11
Trade-off Analysis
Privacy Technique
Poisoning