Timber! Poisoning Decision Trees Authors: Stefano Calzavara, Lorenzo Cazzaro, Massimo Vettori | Published: 2024-10-01 Backdoor AttackPoisoning 2024.10.01 2025.05.27 Literature Database
The poison of dimensionality Authors: Lê-Nguyên Hoang | Published: 2024-09-25 PoisoningModel Performance EvaluationLoss Function 2024.09.25 2025.05.27 Literature Database
MalMixer: Few-Shot Malware Classification with Retrieval-Augmented Semi-Supervised Learning Authors: Jiliang Li, Yifan Zhang, Yu Huang, Kevin Leach | Published: 2024-09-20 | Updated: 2025-04-17 Data Augmentation MethodPoisoningMalware Detection with Limited Samples 2024.09.20 2025.05.27 Literature Database
Federated Learning for Smart Grid: A Survey on Applications and Potential Vulnerabilities Authors: Zikai Zhang, Suman Rath, Jiaohao Xu, Tingsong Xiao | Published: 2024-09-16 Energy ManagementPrivacy ProtectionPoisoning 2024.09.16 2025.05.27 Literature Database
On the Vulnerability of Applying Retrieval-Augmented Generation within Knowledge-Intensive Application Domains Authors: Xun Xian, Ganghua Wang, Xuan Bi, Jayanth Srinivasa, Ashish Kundu, Charles Fleming, Mingyi Hong, Jie Ding | Published: 2024-09-12 RAGPoisoning 2024.09.12 2025.05.27 Literature Database
Revisiting Static Feature-Based Android Malware Detection Authors: Md Tanvirul Alam, Dipkamal Bhusal, Nidhi Rastogi | Published: 2024-09-11 Dataset GenerationPoisoningModel Performance Evaluation 2024.09.11 2025.05.27 Literature Database
2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures Authors: Xinheng Xie, Kureha Yamaguchi, Margaux Leblanc, Simon Malzard, Varun Chhabra, Victoria Nockles, Yue Wu | Published: 2024-09-08 | Updated: 2025-03-20 Backdoor AttackPoisoningEvaluation Method 2024.09.08 2025.05.27 Literature Database
Enhancing Quantum Security over Federated Learning via Post-Quantum Cryptography Authors: Pingzhi Li, Tianlong Chen, Junyu Liu | Published: 2024-09-06 PoisoningCommunication EfficiencyQuantum Cryptography Technology 2024.09.06 2025.05.27 Literature Database
The Dark Side of Human Feedback: Poisoning Large Language Models via User Inputs Authors: Bocheng Chen, Hanqing Guo, Guangjing Wang, Yuanda Wang, Qiben Yan | Published: 2024-09-01 LLM Performance EvaluationPrompt InjectionPoisoning 2024.09.01 2025.05.27 Literature Database
Comprehensive Botnet Detection by Mitigating Adversarial Attacks, Navigating the Subtleties of Perturbation Distances and Fortifying Predictions with Conformal Layers Authors: Rahul Yumlembam, Biju Issac, Seibu Mary Jacob, Longzhi Yang | Published: 2024-09-01 PoisoningAdversarial ExampleEvaluation Method 2024.09.01 2025.05.27 Literature Database