A Survey on Malware Detection with Graph Representation Learning Authors: Tristan Bilot, Nour El Madhoun, Khaldoun Al Agha, Anis Zouaoui | Published: 2023-03-28 | Updated: 2023-08-17 Graph EmbeddingPoisoningMalware Classification 2023.03.28 2025.05.28 Literature Database
The Devil’s Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2023-03-15 | Updated: 2024-01-11 DNN IP Protection MethodPoisoningDeep Learning Method 2023.03.15 2025.05.28 Literature Database
Exploring the Limits of Model-Targeted Indiscriminate Data Poisoning Attacks Authors: Yiwei Lu, Gautam Kamath, Yaoliang Yu | Published: 2023-03-07 | Updated: 2023-06-06 Data Contamination DetectionPoisoningPoisoning Attack 2023.03.07 2025.05.28 Literature Database
MultiRobustBench: Benchmarking Robustness Against Multiple Attacks Authors: Sihui Dai, Saeed Mahloujifar, Chong Xiang, Vikash Sehwag, Pin-Yu Chen, Prateek Mittal | Published: 2023-02-21 | Updated: 2023-07-20 DNN IP Protection MethodPoisoningModel Performance Evaluation 2023.02.21 2025.05.28 Literature Database
Poisoning Web-Scale Training Datasets is Practical Authors: Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum Anderson, Andreas Terzis, Kurt Thomas, Florian Tramèr | Published: 2023-02-20 | Updated: 2024-05-06 PoisoningAttack Scenario AnalysisAdversarial attack 2023.02.20 2025.05.28 Literature Database
WW-FL: Secure and Private Large-Scale Federated Learning Authors: Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Christian Weinert, Hossein Yalame | Published: 2023-02-20 | Updated: 2025-10-14 Trigger DetectionPrivacy Enhancing TechnologyPoisoning 2023.02.20 2025.10.16 Literature Database
Continuous Learning for Android Malware Detection Authors: Yizheng Chen, Zhoujie Ding, David Wagner | Published: 2023-02-08 | Updated: 2023-06-14 Online LearningPoisoningModel Performance Evaluation 2023.02.08 2025.05.28 Literature Database
SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification Authors: Gorka Abad, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek, Mauro Conti | Published: 2023-02-03 | Updated: 2023-04-21 DNN IP Protection MethodPoisoningPoisoning Attack 2023.02.03 2025.05.28 Literature Database
Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness Authors: Bao Gia Doan, Shuiqiao Yang, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2023-01-30 Backdoor AttackBayesian Adversarial LearningPoisoning 2023.01.30 2025.05.28 Literature Database
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering Authors: Rui Zhu, Di Tang, Siyuan Tang, Guanhong Tao, Shiqing Ma, Xiaofeng Wang, Haixu Tang | Published: 2023-01-29 | Updated: 2024-03-02 WatermarkingPoisoningAnalysis of Detection Methods 2023.01.29 2025.05.28 Literature Database