Poisoning

Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks

Authors: Kaleel Mahmood, Rigel Mahmood, Ethan Rathbun, Marten van Dijk | Published: 2021-09-29
Backdoor Attack
Poisoning
Adversarial attack

Adversarial Transfer Attacks With Unknown Data and Class Overlap

Authors: Luke E. Richards, André Nguyen, Ryan Capps, Steven Forsythe, Cynthia Matuszek, Edward Raff | Published: 2021-09-23 | Updated: 2021-09-24
Poisoning
Robustness
Adversarial attack

SoK: Machine Learning Governance

Authors: Varun Chandrasekaran, Hengrui Jia, Anvith Thudi, Adelin Travers, Mohammad Yaghini, Nicolas Papernot | Published: 2021-09-20
Privacy Risk Management
Poisoning
Federated Learning

Dubhe: Towards Data Unbiasedness with Homomorphic Encryption in Federated Learning Client Selection

Authors: Shulai Zhang, Zirui Li, Quan Chen, Wenli Zheng, Jingwen Leng, Minyi Guo | Published: 2021-09-08
Client Selection Method
Poisoning
Federated Learning

Machine Unlearning of Features and Labels

Authors: Alexander Warnecke, Lukas Pirch, Christian Wressnegger, Konrad Rieck | Published: 2021-08-26 | Updated: 2023-08-07
Backdoor Attack
Poisoning
Machine Learning Method

Privacy-Preserving Machine Learning: Methods, Challenges and Directions

Authors: Runhua Xu, Nathalie Baracaldo, James Joshi | Published: 2021-08-10 | Updated: 2021-09-22
Privacy Protection Pipeline
Privacy Assessment
Poisoning

Secure Neuroimaging Analysis using Federated Learning with Homomorphic Encryption

Authors: Dimitris Stripelis, Hamza Saleem, Tanmay Ghai, Nikhil Dhinagar, Umang Gupta, Chrysovalantis Anastasiou, Greg Ver Steeg, Srivatsan Ravi, Muhammad Naveed, Paul M. Thompson, Jose Luis Ambite | Published: 2021-08-07 | Updated: 2021-11-09
Algorithm
Poisoning
Federated Learning

Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks

Authors: Alberto Mozo, Ángel González-Prieto, Antonio Pastor, Sandra Gómez-Canaval, Edgar Talavera | Published: 2021-07-30
Data Generation
Poisoning
Machine Learning Algorithm

PDF-Malware: An Overview on Threats, Detection and Evasion Attacks

Authors: Nicolas Fleury, Theo Dubrunquez, Ihsen Alouani | Published: 2021-07-27
Overview of PDF Format
Poisoning
Malware Detection

LEGATO: A LayerwisE Gradient AggregaTiOn Algorithm for Mitigating Byzantine Attacks in Federated Learning

Authors: Kamala Varma, Yi Zhou, Nathalie Baracaldo, Ali Anwar | Published: 2021-07-26
Poisoning
Attackers and Malicious Devices
Federated Learning