Poisoning

Data Poisoning Attacks on Federated Machine Learning

Authors: Gan Sun, Yang Cong, Jiahua Dong, Qiang Wang, Ji Liu | Published: 2020-04-19
Poisoning
Attack Scenario Analysis
Machine Learning

Poisoning Attacks on Algorithmic Fairness

Authors: David Solans, Battista Biggio, Carlos Castillo | Published: 2020-04-15 | Updated: 2020-06-26
Algorithm Fairness
Poisoning
Optimization Methods

Weight Poisoning Attacks on Pre-trained Models

Authors: Keita Kurita, Paul Michel, Graham Neubig | Published: 2020-04-14
Backdoor Attack
Poisoning
Adversarial Learning

Towards Federated Learning With Byzantine-Robust Client Weighting

Authors: Amit Portnoy, Yoav Tirosh, Danny Hendler | Published: 2020-04-10 | Updated: 2021-05-18
Poisoning
Robustness Improvement Method
Optimization Problem

Deep Learning and Open Set Malware Classification: A Survey

Authors: Jingyun Jia | Published: 2020-04-08
Open Set Recognition
Poisoning
Malware Classification

An Overview of Federated Deep Learning Privacy Attacks and Defensive Strategies

Authors: David Enthoven, Zaid Al-Ars | Published: 2020-04-01
Poisoning
Attack Evaluation
Defense Method

MetaPoison: Practical General-purpose Clean-label Data Poisoning

Authors: W. Ronny Huang, Jonas Geiping, Liam Fowl, Gavin Taylor, Tom Goldstein | Published: 2020-04-01 | Updated: 2021-02-21
Backdoor Attack
Poisoning
Adversarial Example

A Separation Result Between Data-oblivious and Data-aware Poisoning Attacks

Authors: Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Abhradeep Thakurta | Published: 2020-03-26 | Updated: 2021-12-13
Poisoning
Adversarial Attack Methods
Vulnerability Attack Method

Diversity can be Transferred: Output Diversification for White- and Black-box Attacks

Authors: Yusuke Tashiro, Yang Song, Stefano Ermon | Published: 2020-03-15 | Updated: 2020-10-30
Poisoning
Adversarial Attack Methods
Vulnerability Attack Method

A Survey of Adversarial Learning on Graphs

Authors: Liang Chen, Jintang Li, Jiaying Peng, Tao Xie, Zengxu Cao, Kun Xu, Xiangnan He, Zibin Zheng, Bingzhe Wu | Published: 2020-03-10 | Updated: 2022-04-05
Poisoning
Adversarial Attack Methods
Defense Method