Poisoning

Transferring Adversarial Robustness Through Robust Representation Matching

Authors: Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati | Published: 2022-02-21 | Updated: 2022-05-05
Poisoning
Robustness
Adaptive Adversarial Training

An Equivalence Between Data Poisoning and Byzantine Gradient Attacks

Authors: Sadegh Farhadkhani, Rachid Guerraoui, Lê-Nguyên Hoang, Oscar Villemaud | Published: 2022-02-17 | Updated: 2022-07-20
Data Contamination Detection
Poisoning
Convergence Analysis

Understanding and Improving Graph Injection Attack by Promoting Unnoticeability

Authors: Yongqiang Chen, Han Yang, Yonggang Zhang, Kaili Ma, Tongliang Liu, Bo Han, James Cheng | Published: 2022-02-16 | Updated: 2022-04-05
Poisoning
Malicious Node Injection
Defense Method

Holistic Adversarial Robustness of Deep Learning Models

Authors: Pin-Yu Chen, Sijia Liu | Published: 2022-02-15 | Updated: 2023-01-05
Poisoning
Adversarial Attack Detection
Defense Method

Improved Certified Defenses against Data Poisoning with (Deterministic) Finite Aggregation

Authors: Wenxiao Wang, Alexander Levine, Soheil Feizi | Published: 2022-02-05 | Updated: 2022-07-14
Dataset evaluation
Poisoning
Robustness Evaluation

Linear Model Against Malicious Adversaries with Local Differential Privacy

Authors: Guanhong Miao, A. Adam Ding, Samuel S. Wu | Published: 2022-02-05 | Updated: 2022-06-29
Privacy Enhancing Protocol
Poisoning
Cryptographic Protocol

Reconstructing Training Data with Informed Adversaries

Authors: Borja Balle, Giovanni Cherubin, Jamie Hayes | Published: 2022-01-13 | Updated: 2022-04-25
Data Selection Strategy
Poisoning
Reconstruction Attack

Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning

Authors: Junyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang | Published: 2021-12-29 | Updated: 2022-10-07
Backdoor Attack
Poisoning
Defense Method

Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems

Authors: Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees, Tayeb Kenaza | Published: 2021-12-22
Poisoning
Adversarial Learning
Defense Method

Distributed Machine Learning and the Semblance of Trust

Authors: Dmitrii Usynin, Alexander Ziller, Daniel Rueckert, Jonathan Passerat-Palmbach, Georgios Kaissis | Published: 2021-12-21
Data Management System
Privacy Violation
Poisoning