Poisoning

Local Competition and Stochasticity for Adversarial Robustness in Deep Learning

Authors: Konstantinos P. Panousis, Sotirios Chatzis, Antonios Alexos, Sergios Theodoridis | Published: 2021-01-04 | Updated: 2021-03-29
Poisoning
Model Performance Evaluation
Deep Learning Method

Active Learning Under Malicious Mislabeling and Poisoning Attacks

Authors: Jing Lin, Ryan Luley, Kaiqi Xiong | Published: 2021-01-01 | Updated: 2021-09-02
Backdoor Attack
Poisoning
Performance Evaluation

Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses

Authors: Micah Goldblum, Dimitris Tsipras, Chulin Xie, Xinyun Chen, Avi Schwarzschild, Dawn Song, Aleksander Madry, Bo Li, Tom Goldstein | Published: 2020-12-18 | Updated: 2021-03-31
Backdoor Attack
Poisoning
Model Protection Methods

Achieving Security and Privacy in Federated Learning Systems: Survey, Research Challenges and Future Directions

Authors: Alberto Blanco-Justicia, Josep Domingo-Ferrer, Sergio Martínez, David Sánchez, Adrian Flanagan, Kuan Eeik Tan | Published: 2020-12-12
Attack Methods against DFL
Poisoning
Federated Learning

I-GCN: Robust Graph Convolutional Network via Influence Mechanism

Authors: Haoxi Zhan, Xiaobing Pei | Published: 2020-12-11
Poisoning
Role of Machine Learning
Knowledge Graph

FAT: Federated Adversarial Training

Authors: Giulio Zizzo, Ambrish Rawat, Mathieu Sinn, Beat Buesser | Published: 2020-12-03
Backdoor Attack
Poisoning
Adversarial Training

Practical Privacy Attacks on Vertical Federated Learning

Authors: Haiqin Weng, Juntao Zhang, Xingjun Ma, Feng Xue, Tao Wei, Shouling Ji, Zhiyuan Zong | Published: 2020-11-18 | Updated: 2022-07-22
Data Privacy Assessment
Poisoning
Attack Type

Privacy Preservation in Federated Learning: An insightful survey from the GDPR Perspective

Authors: Nguyen Truong, Kai Sun, Siyao Wang, Florian Guitton, Yike Guo | Published: 2020-11-10 | Updated: 2021-03-18
Watermarking
Data Privacy Assessment
Poisoning

DualNet: Locate Then Detect Effective Payload with Deep Attention Network

Authors: Shiyi Yang, Peilun Wu, Hui Guo | Published: 2020-10-23
Poisoning
Machine Learning Method
Feature Importance Analysis

VenoMave: Targeted Poisoning Against Speech Recognition

Authors: Hojjat Aghakhani, Lea Schönherr, Thorsten Eisenhofer, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, Giovanni Vigna | Published: 2020-10-21 | Updated: 2023-04-20
Backdoor Attack
Poisoning
Poisoning Attack