Byzantines can also Learn from History: Fall of Centered Clipping in Federated Learning Authors: Kerem Ozfatura, Emre Ozfatura, Alptekin Kupcu, Deniz Gunduz | Published: 2022-08-21 | Updated: 2024-01-01 Byzantine ResiliencePoisoningAttack Detection 2022.08.21 2025.05.28 Literature Database
Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System Authors: Abdur R. Shahid, Ahmed Imteaj, Peter Y. Wu, Diane A. Igoche, Tauhidul Alam | Published: 2022-08-17 Data Protection MethodPoisoningAttack Detection 2022.08.17 2025.05.28 Literature Database
FedPerm: Private and Robust Federated Learning by Parameter Permutation Authors: Hamid Mozaffari, Virendra J. Marathe, Dave Dice | Published: 2022-08-16 Privacy Risk ManagementPoisoningCommunication Efficiency 2022.08.16 2025.05.28 Literature Database
Shielding Federated Learning Systems against Inference Attacks with ARM TrustZone Authors: Aghiles Ait Messaoud, Sonia Ben Mokhtar, Vlad Nitu, Valerio Schiavoni | Published: 2022-08-11 | Updated: 2022-10-15 Client-Side DefensePoisoningAttack Method 2022.08.11 2025.05.28 Literature Database
Privacy and Transparency in Graph Machine Learning: A Unified Perspective Authors: Megha Khosla | Published: 2022-07-22 | Updated: 2022-10-19 Explainability of Graph Machine LearningPrivacy ClassificationPoisoning 2022.07.22 2025.05.28 Literature Database
Careful What You Wish For: on the Extraction of Adversarially Trained Models Authors: Kacem Khaled, Gabriela Nicolescu, Felipe Gohring de Magalhães | Published: 2022-07-21 PoisoningAttack MethodAdversarial Example 2022.07.21 2025.05.28 Literature Database
MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning Authors: Hua Ma, Qun Li, Yifeng Zheng, Zhi Zhang, Xiaoning Liu, Yansong Gao, Said F. Al-Sarawi, Derek Abbott | Published: 2022-07-19 Attack Methods against DFLPrivacy Enhancing TechnologyPoisoning 2022.07.19 2025.05.28 Literature Database
Using Anomaly Detection to Detect Poisoning Attacks in Federated Learning Applications Authors: Ali Raza, Shujun Li, Kim-Phuc Tran, Ludovic Koehl, Kim Duc Tran | Published: 2022-07-18 | Updated: 2025-03-25 PoisoningMalicious ClientDetection of Poisonous Data 2022.07.18 2025.05.28 Literature Database
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware Authors: Luca Demetrio, Battista Biggio, Fabio Roli | Published: 2022-07-12 Attack Methods against DFLPoisoningMalware Propagation Means 2022.07.12 2025.05.28 Literature Database
Efficient and Privacy Preserving Group Signature for Federated Learning Authors: Sneha Kanchan, Jae Won Jang, Jun Yong Yoon, Bong Jun Choi | Published: 2022-07-12 | Updated: 2022-07-15 Group SignaturePoisoningCommunication Efficiency 2022.07.12 2025.05.28 Literature Database