Poisoning

Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation

Authors: Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot | Published: 2023-01-09 | Updated: 2023-04-12
DNN IP Protection Method
Privacy Enhancing Technology
Poisoning

Linear and non-linear machine learning attacks on physical unclonable functions

Authors: Michael Lachner | Published: 2023-01-06
Watermarking
Poisoning
Principle of Optical PUF

TrojanPuzzle: Covertly Poisoning Code-Suggestion Models

Authors: Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim | Published: 2023-01-06 | Updated: 2024-01-24
Backdoor Attack
Poisoning
Attack Method

Backdoor Attacks Against Dataset Distillation

Authors: Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang | Published: 2023-01-03
DNN IP Protection Method
Backdoor Attack
Poisoning

Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector

Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam | Published: 2023-01-03
Backdoor Attack
Poisoning
Performance Evaluation

Learned Systems Security

Authors: Roei Schuster, Jin Peng Zhou, Thorsten Eisenhofer, Paul Grubbs, Nicolas Papernot | Published: 2022-12-20 | Updated: 2023-01-10
Backdoor Attack
Privacy Enhancing Technology
Poisoning

Amplifying Membership Exposure via Data Poisoning

Authors: Yufei Chen, Chao Shen, Yun Shen, Cong Wang, Yang Zhang | Published: 2022-11-01
Poisoning
Membership Inference
Membership Disclosure Risk

Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning

Authors: Ying Yuan, Giovanni Apruzzese, Mauro Conti | Published: 2022-10-24 | Updated: 2023-10-12
Poisoning
Malicious Website Detection
Attack Scenario Analysis

Ares: A System-Oriented Wargame Framework for Adversarial ML

Authors: Farhan Ahmed, Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati | Published: 2022-10-24
Poisoning
Reward Mechanism Design
Evaluation Method

New data poison attacks on machine learning classifiers for mobile exfiltration

Authors: Miguel A. Ramirez, Sangyoung Yoon, Ernesto Damiani, Hussam Al Hamadi, Claudio Agostino Ardagna, Nicola Bena, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun | Published: 2022-10-20
Backdoor Attack
Poisoning
Adversarial Attack Methods