A Framework for Evaluating Gradient Leakage Attacks in Federated Learning Authors: Wenqi Wei, Ling Liu, Margaret Loper, Ka-Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2020-04-22 | Updated: 2020-04-23 Privacy Enhancing TechnologyPoisoningAttack Type 2020.04.22 2025.05.28 Literature Database
Headless Horseman: Adversarial Attacks on Transfer Learning Models Authors: Ahmed Abdelkader, Michael J. Curry, Liam Fowl, Tom Goldstein, Avi Schwarzschild, Manli Shu, Christoph Studer, Chen Zhu | Published: 2020-04-20 PoisoningAdversarial Perturbation TechniquesMachine Learning 2020.04.20 2025.05.28 Literature Database
Data Poisoning Attacks on Federated Machine Learning Authors: Gan Sun, Yang Cong, Jiahua Dong, Qiang Wang, Ji Liu | Published: 2020-04-19 PoisoningAttack Scenario AnalysisMachine Learning 2020.04.19 2025.05.28 Literature Database
Poisoning Attacks on Algorithmic Fairness Authors: David Solans, Battista Biggio, Carlos Castillo | Published: 2020-04-15 | Updated: 2020-06-26 Algorithm FairnessPoisoningOptimization Methods 2020.04.15 2025.05.28 Literature Database
Weight Poisoning Attacks on Pre-trained Models Authors: Keita Kurita, Paul Michel, Graham Neubig | Published: 2020-04-14 Backdoor AttackPoisoningAdversarial Learning 2020.04.14 2025.05.28 Literature Database
Towards Federated Learning With Byzantine-Robust Client Weighting Authors: Amit Portnoy, Yoav Tirosh, Danny Hendler | Published: 2020-04-10 | Updated: 2021-05-18 PoisoningRobustness Improvement MethodOptimization Problem 2020.04.10 2025.05.28 Literature Database
Deep Learning and Open Set Malware Classification: A Survey Authors: Jingyun Jia | Published: 2020-04-08 Open Set RecognitionPoisoningMalware Classification 2020.04.08 2025.05.28 Literature Database
An Overview of Federated Deep Learning Privacy Attacks and Defensive Strategies Authors: David Enthoven, Zaid Al-Ars | Published: 2020-04-01 PoisoningAttack EvaluationDefense Method 2020.04.01 2025.05.28 Literature Database
MetaPoison: Practical General-purpose Clean-label Data Poisoning Authors: W. Ronny Huang, Jonas Geiping, Liam Fowl, Gavin Taylor, Tom Goldstein | Published: 2020-04-01 | Updated: 2021-02-21 Backdoor AttackPoisoningAdversarial Example 2020.04.01 2025.05.28 Literature Database
A Separation Result Between Data-oblivious and Data-aware Poisoning Attacks Authors: Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Abhradeep Thakurta | Published: 2020-03-26 | Updated: 2021-12-13 PoisoningAdversarial Attack MethodsVulnerability Attack Method 2020.03.26 2025.05.28 Literature Database