MultiRobustBench: Benchmarking Robustness Against Multiple Attacks Authors: Sihui Dai, Saeed Mahloujifar, Chong Xiang, Vikash Sehwag, Pin-Yu Chen, Prateek Mittal | Published: 2023-02-21 | Updated: 2023-07-20 DNN IP Protection MethodPoisoningModel Performance Evaluation 2023.02.21 2025.05.28 Literature Database
Poisoning Web-Scale Training Datasets is Practical Authors: Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum Anderson, Andreas Terzis, Kurt Thomas, Florian Tramèr | Published: 2023-02-20 | Updated: 2024-05-06 PoisoningAttack Scenario AnalysisAdversarial attack 2023.02.20 2025.05.28 Literature Database
Continuous Learning for Android Malware Detection Authors: Yizheng Chen, Zhoujie Ding, David Wagner | Published: 2023-02-08 | Updated: 2023-06-14 Online LearningPoisoningModel Performance Evaluation 2023.02.08 2025.05.28 Literature Database
SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification Authors: Gorka Abad, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek, Mauro Conti | Published: 2023-02-03 | Updated: 2023-04-21 DNN IP Protection MethodPoisoningPoisoning Attack 2023.02.03 2025.05.28 Literature Database
Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness Authors: Bao Gia Doan, Shuiqiao Yang, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2023-01-30 Backdoor AttackBayesian Adversarial LearningPoisoning 2023.01.30 2025.05.28 Literature Database
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering Authors: Rui Zhu, Di Tang, Siyuan Tang, Guanhong Tao, Shiqing Ma, Xiaofeng Wang, Haixu Tang | Published: 2023-01-29 | Updated: 2024-03-02 WatermarkingPoisoningAnalysis of Detection Methods 2023.01.29 2025.05.28 Literature Database
Backdoor Attacks in Peer-to-Peer Federated Learning Authors: Georgios Syros, Gokberk Yar, Simona Boboila, Cristina Nita-Rotaru, Alina Oprea | Published: 2023-01-23 | Updated: 2024-09-17 Backdoor AttackPoisoningClassification of Malicious Actors 2023.01.23 2025.05.28 Literature Database
Towards Understanding How Self-training Tolerates Data Backdoor Poisoning Authors: Soumyadeep Pal, Ren Wang, Yuguang Yao, Sijia Liu | Published: 2023-01-20 Backdoor AttackPoisoningSelf-Learning Method 2023.01.20 2025.05.28 Literature Database
On the Vulnerability of Backdoor Defenses for Federated Learning Authors: Pei Fang, Jinghui Chen | Published: 2023-01-19 DNN IP Protection MethodPoisoningFeature Importance Analysis 2023.01.19 2025.05.28 Literature Database
Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy Authors: Yusuke Kawamoto, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa | Published: 2023-01-18 | Updated: 2023-01-19 PoisoningMembership InferenceVulnerability Management 2023.01.18 2025.05.28 Literature Database