Poisoning

Robust Federated Recommendation System

Authors: Chen Chen, Jingfeng Zhang, Anthony K. H. Tung, Mohan Kankanhalli, Gang Chen | Published: 2020-06-15
Algorithm Design
Poisoning
Watermarking Technology

Defending SVMs against Poisoning Attacks: the Hardness and DBSCAN Approach

Authors: Hu Ding, Fan Yang, Jiawei Huang | Published: 2020-06-14 | Updated: 2021-02-20
Algorithm
Poisoning
Fundamentals of Machine Learning

Adversarial Self-Supervised Contrastive Learning

Authors: Minseon Kim, Jihoon Tack, Sung Ju Hwang | Published: 2020-06-13 | Updated: 2020-10-26
Performance Evaluation
Poisoning
Adversarial Attack Detection

Backdoor Attacks on Federated Meta-Learning

Authors: Chien-Lun Chen, Leana Golubchik, Marco Paolieri | Published: 2020-06-12 | Updated: 2020-12-16
Backdoor Attack
Poisoning
Federated Learning

Backdoors in Neural Models of Source Code

Authors: Goutham Ramakrishnan, Aws Albarghouthi | Published: 2020-06-11
Backdoor Attack
Program Analysis
Poisoning

Sponge Examples: Energy-Latency Attacks on Neural Networks

Authors: Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, Ross Anderson | Published: 2020-06-05 | Updated: 2021-05-12
Energy Management
Poisoning
Membership Inference

Perturbation Analysis of Gradient-based Adversarial Attacks

Authors: Utku Ozbulak, Manvel Gasparyan, Wesley De Neve, Arnout Van Messem | Published: 2020-06-02
Poisoning
Attack Type
Adversarial Attack Detection

Exploring the role of Input and Output Layers of a Deep Neural Network in Adversarial Defense

Authors: Jay N. Paranjape, Rahul Kumar Dubey, Vijendran V Gopalan | Published: 2020-06-02
Poisoning
Attack Type
Defense Effectiveness Analysis

Rethinking Empirical Evaluation of Adversarial Robustness Using First-Order Attack Methods

Authors: Kyungmi Lee, Anantha P. Chandrakasan | Published: 2020-06-01
Poisoning
Adversarial Attack Detection
Defense Effectiveness Analysis

A Framework for Behavioral Biometric Authentication using Deep Metric Learning on Mobile Devices

Authors: Cong Wang, Yanru Xiao, Xing Gao, Li Li, Jun Wang | Published: 2020-05-26 | Updated: 2020-08-17
Performance Evaluation
Poisoning
Machine Learning Technology