Poisoning Network Flow Classifiers Authors: Giorgio Severi, Simona Boboila, Alina Oprea, John Holodnak, Kendra Kratkiewicz, Jason Matterer | Published: 2023-06-02 Backdoor AttackPoisoningAdversarial attack 2023.06.02 2025.05.28 Literature Database
Hyperparameter Learning under Data Poisoning: Analysis of the Influence of Regularization via Multiobjective Bilevel Optimization Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2023-06-02 | Updated: 2023-06-23 PoisoningAttack EvaluationRegularization 2023.06.02 2025.05.28 Literature Database
Adversarial Robustness in Unsupervised Machine Learning: A Systematic Review Authors: Mathias Lundteigen Mohus, Jinyue Li | Published: 2023-06-01 Privacy Protection MethodPoisoningAdversarial Attack Methods 2023.06.01 2025.05.28 Literature Database
Constructing Semantics-Aware Adversarial Examples with a Probabilistic Perspective Authors: Andi Zhang, Mingtian Zhang, Damon Wischik | Published: 2023-06-01 | Updated: 2024-11-24 PoisoningDiffusion ModelAdversarial Attack Methods 2023.06.01 2025.05.28 Literature Database
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense Authors: Yue Cui, Syed Irfan Ali Meerza, Zhuohang Li, Luyang Liu, Jiaxin Zhang, Jian Liu | Published: 2023-04-11 Trade-off AnalysisPrivacy TechniquePoisoning 2023.04.11 2025.05.28 Literature Database
Balancing Privacy and Performance for Private Federated Learning Algorithms Authors: Xiangjian Hou, Sarit Khirirat, Mohammad Yaqub, Samuel Horvath | Published: 2023-04-11 | Updated: 2023-08-18 Privacy TechniquePoisoningOptimization Methods 2023.04.11 2025.05.28 Literature Database
Protecting Federated Learning from Extreme Model Poisoning Attacks via Multidimensional Time Series Anomaly Detection Authors: Edoardo Gabrielli, Dimitri Belli, Zoe Matrullo, Vittorio Miori, Gabriele Tolomei | Published: 2023-03-29 | Updated: 2024-12-02 Data Contamination DetectionPoisoningConvergence Property 2023.03.29 2025.05.28 Literature Database
A Survey on Malware Detection with Graph Representation Learning Authors: Tristan Bilot, Nour El Madhoun, Khaldoun Al Agha, Anis Zouaoui | Published: 2023-03-28 | Updated: 2023-08-17 Graph EmbeddingPoisoningMalware Classification 2023.03.28 2025.05.28 Literature Database
The Devil’s Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2023-03-15 | Updated: 2024-01-11 DNN IP Protection MethodPoisoningDeep Learning Method 2023.03.15 2025.05.28 Literature Database
Exploring the Limits of Model-Targeted Indiscriminate Data Poisoning Attacks Authors: Yiwei Lu, Gautam Kamath, Yaoliang Yu | Published: 2023-03-07 | Updated: 2023-06-06 Data Contamination DetectionPoisoningPoisoning Attack 2023.03.07 2025.05.28 Literature Database