Data Poisoning Attacks on Federated Machine Learning Authors: Gan Sun, Yang Cong, Jiahua Dong, Qiang Wang, Ji Liu | Published: 2020-04-19 PoisoningAttack Scenario AnalysisMachine Learning 2020.04.19 2025.05.28 Literature Database
Poisoning Attacks on Algorithmic Fairness Authors: David Solans, Battista Biggio, Carlos Castillo | Published: 2020-04-15 | Updated: 2020-06-26 Algorithm FairnessPoisoningOptimization Methods 2020.04.15 2025.05.28 Literature Database
Weight Poisoning Attacks on Pre-trained Models Authors: Keita Kurita, Paul Michel, Graham Neubig | Published: 2020-04-14 Backdoor AttackPoisoningAdversarial Learning 2020.04.14 2025.05.28 Literature Database
Towards Federated Learning With Byzantine-Robust Client Weighting Authors: Amit Portnoy, Yoav Tirosh, Danny Hendler | Published: 2020-04-10 | Updated: 2021-05-18 PoisoningRobustness Improvement MethodOptimization Problem 2020.04.10 2025.05.28 Literature Database
Deep Learning and Open Set Malware Classification: A Survey Authors: Jingyun Jia | Published: 2020-04-08 Open Set RecognitionPoisoningMalware Classification 2020.04.08 2025.05.28 Literature Database
An Overview of Federated Deep Learning Privacy Attacks and Defensive Strategies Authors: David Enthoven, Zaid Al-Ars | Published: 2020-04-01 PoisoningAttack EvaluationDefense Method 2020.04.01 2025.05.28 Literature Database
MetaPoison: Practical General-purpose Clean-label Data Poisoning Authors: W. Ronny Huang, Jonas Geiping, Liam Fowl, Gavin Taylor, Tom Goldstein | Published: 2020-04-01 | Updated: 2021-02-21 Backdoor AttackPoisoningAdversarial Example 2020.04.01 2025.05.28 Literature Database
A Separation Result Between Data-oblivious and Data-aware Poisoning Attacks Authors: Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Abhradeep Thakurta | Published: 2020-03-26 | Updated: 2021-12-13 PoisoningAdversarial Attack MethodsVulnerability Attack Method 2020.03.26 2025.05.28 Literature Database
Diversity can be Transferred: Output Diversification for White- and Black-box Attacks Authors: Yusuke Tashiro, Yang Song, Stefano Ermon | Published: 2020-03-15 | Updated: 2020-10-30 PoisoningAdversarial Attack MethodsVulnerability Attack Method 2020.03.15 2025.05.28 Literature Database
A Survey of Adversarial Learning on Graphs Authors: Liang Chen, Jintang Li, Jiaying Peng, Tao Xie, Zengxu Cao, Kun Xu, Xiangnan He, Zibin Zheng, Bingzhe Wu | Published: 2020-03-10 | Updated: 2022-04-05 PoisoningAdversarial Attack MethodsDefense Method 2020.03.10 2025.05.28 Literature Database