Toward Smart Security Enhancement of Federated Learning Networks Authors: Junjie Tan, Ying-Chang Liang, Nguyen Cong Luong, Dusit Niyato | Published: 2020-08-19 PoisoningPoisoning AttackFederated Learning 2020.08.19 2025.05.28 Literature Database
WAFFLE: Watermarking in Federated Learning Authors: Buse Gul Atli, Yuxi Xia, Samuel Marchal, N. Asokan | Published: 2020-08-17 | Updated: 2021-07-22 WatermarkingPoisoningMachine Learning Application 2020.08.17 2025.05.28 Literature Database
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection Authors: Luca Demetrio, Scott E. Coull, Battista Biggio, Giovanni Lagorio, Alessandro Armando, Fabio Roli | Published: 2020-08-17 | Updated: 2021-03-22 PoisoningMalware EvolutionMembership Inference 2020.08.17 2025.05.28 Literature Database
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis Authors: Ming Fan, Wenying Wei, Xiaofei Xie, Yang Liu, Xiaohong Guan, Ting Liu | Published: 2020-08-13 PoisoningEvaluation of Explanatory Approaches 2020.08.13 2025.05.28 Literature Database
WAFFLe: Weight Anonymized Factorization for Federated Learning Authors: Weituo Hao, Nikhil Mehta, Kevin J Liang, Pengyu Cheng, Mostafa El-Khamy, Lawrence Carin | Published: 2020-08-13 PoisoningPersonalization MethodMachine Learning Method 2020.08.13 2025.05.28 Literature Database
Robust Deep Reinforcement Learning through Adversarial Loss Authors: Tuomas Oikarinen, Wang Zhang, Alexandre Megretski, Luca Daniel, Tsui-Wei Weng | Published: 2020-08-05 | Updated: 2021-11-10 PoisoningReinforcement LearningAdversarial Example 2020.08.05 2025.05.28 Literature Database
Towards Class-Oriented Poisoning Attacks Against Neural Networks Authors: Bingyin Zhao, Yingjie Lao | Published: 2020-07-31 | Updated: 2021-10-11 Backdoor AttackPoisoningAttack Method 2020.07.31 2025.05.28 Literature Database
Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus | Published: 2020-07-31 PoisoningAttack MethodDeep Learning 2020.07.31 2025.05.28 Literature Database
Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases Authors: Ren Wang, Gaoyuan Zhang, Sijia Liu, Pin-Yu Chen, Jinjun Xiong, Meng Wang | Published: 2020-07-31 Backdoor AttackPoisoningAttack Method 2020.07.31 2025.05.28 Literature Database
Dynamic Defense Against Byzantine Poisoning Attacks in Federated Learning Authors: Nuria Rodríguez-Barroso, Eugenio Martínez-Cámara, M. Victoria Luzón, Francisco Herrera | Published: 2020-07-29 | Updated: 2022-02-24 Byzantine ResiliencePoisoningDefense Mechanism 2020.07.29 2025.05.28 Literature Database