Backdoor Attacks in Peer-to-Peer Federated Learning Authors: Georgios Syros, Gokberk Yar, Simona Boboila, Cristina Nita-Rotaru, Alina Oprea | Published: 2023-01-23 | Updated: 2024-09-17 Backdoor AttackPoisoningClassification of Malicious Actors 2023.01.23 2025.05.28 Literature Database
Towards Understanding How Self-training Tolerates Data Backdoor Poisoning Authors: Soumyadeep Pal, Ren Wang, Yuguang Yao, Sijia Liu | Published: 2023-01-20 Backdoor AttackPoisoningSelf-Learning Method 2023.01.20 2025.05.28 Literature Database
On the Vulnerability of Backdoor Defenses for Federated Learning Authors: Pei Fang, Jinghui Chen | Published: 2023-01-19 DNN IP Protection MethodPoisoningFeature Importance Analysis 2023.01.19 2025.05.28 Literature Database
Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy Authors: Yusuke Kawamoto, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa | Published: 2023-01-18 | Updated: 2023-01-19 PoisoningMembership InferenceVulnerability Management 2023.01.18 2025.05.28 Literature Database
Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation Authors: Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot | Published: 2023-01-09 | Updated: 2023-04-12 DNN IP Protection MethodPrivacy Enhancing TechnologyPoisoning 2023.01.09 2025.05.28 Literature Database
Linear and non-linear machine learning attacks on physical unclonable functions Authors: Michael Lachner | Published: 2023-01-06 WatermarkingPoisoningPrinciple of Optical PUF 2023.01.06 2025.05.28 Literature Database
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models Authors: Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim | Published: 2023-01-06 | Updated: 2024-01-24 Backdoor AttackPoisoningAttack Method 2023.01.06 2025.05.28 Literature Database
Backdoor Attacks Against Dataset Distillation Authors: Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang | Published: 2023-01-03 DNN IP Protection MethodBackdoor AttackPoisoning 2023.01.03 2025.05.28 Literature Database
Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam | Published: 2023-01-03 Backdoor AttackPoisoningPerformance Evaluation 2023.01.03 2025.05.28 Literature Database
Learned Systems Security Authors: Roei Schuster, Jin Peng Zhou, Thorsten Eisenhofer, Paul Grubbs, Nicolas Papernot | Published: 2022-12-20 | Updated: 2023-01-10 Backdoor AttackPrivacy Enhancing TechnologyPoisoning 2022.12.20 2025.05.28 Literature Database