Fairness and Privacy-Preserving in Federated Learning: A Survey Authors: Taki Hasan Rafi, Faiza Anan Noor, Tahmid Hussain, Dong-Kyu Chae | Published: 2023-06-14 | Updated: 2023-07-14 Privacy TechniquePoisoningFederated Learning 2023.06.14 2025.05.28 Literature Database
Theoretical Foundations of Adversarially Robust Learning Authors: Omar Montasser | Published: 2023-06-13 PoisoningRobustness EvaluationAdversarial Example 2023.06.13 2025.05.28 Literature Database
SRATTA : Sample Re-ATTribution Attack of Secure Aggregation in Federated Learning Authors: Tanguy Marchand, Régis Loeb, Ulysse Marteau-Ferey, Jean Ogier du Terrail, Arthur Pignet | Published: 2023-06-13 PoisoningMalicious ClientFederated Learning 2023.06.13 2025.05.28 Literature Database
FheFL: Fully Homomorphic Encryption Friendly Privacy-Preserving Federated Learning with Byzantine Users Authors: Yogachandran Rahulamathavan, Charuka Herath, Xiaolan Liu, Sangarapillai Lambotharan, Carsten Maple | Published: 2023-06-08 | Updated: 2024-10-06 PoisoningMulti-Party ComputationFederated Learning 2023.06.08 2025.05.28 Literature Database
A Survey on Federated Learning Poisoning Attacks and Defenses Authors: Junchuan Lianga, Rong Wang, Chaosheng Feng, Chin-Chen Chang | Published: 2023-06-06 Backdoor AttackPoisoningUntargeted Toxicity Attack 2023.06.06 2025.05.28 Literature Database
Poisoning Network Flow Classifiers Authors: Giorgio Severi, Simona Boboila, Alina Oprea, John Holodnak, Kendra Kratkiewicz, Jason Matterer | Published: 2023-06-02 Backdoor AttackPoisoningAdversarial attack 2023.06.02 2025.05.28 Literature Database
Hyperparameter Learning under Data Poisoning: Analysis of the Influence of Regularization via Multiobjective Bilevel Optimization Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2023-06-02 | Updated: 2023-06-23 PoisoningAttack EvaluationRegularization 2023.06.02 2025.05.28 Literature Database
Adversarial Robustness in Unsupervised Machine Learning: A Systematic Review Authors: Mathias Lundteigen Mohus, Jinyue Li | Published: 2023-06-01 Privacy Protection MethodPoisoningAdversarial Attack Methods 2023.06.01 2025.05.28 Literature Database
Constructing Semantics-Aware Adversarial Examples with a Probabilistic Perspective Authors: Andi Zhang, Mingtian Zhang, Damon Wischik | Published: 2023-06-01 | Updated: 2024-11-24 PoisoningDiffusion ModelAdversarial Attack Methods 2023.06.01 2025.05.28 Literature Database
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense Authors: Yue Cui, Syed Irfan Ali Meerza, Zhuohang Li, Luyang Liu, Jiaxin Zhang, Jian Liu | Published: 2023-04-11 Trade-off AnalysisPrivacy TechniquePoisoning 2023.04.11 2025.05.28 Literature Database