Abnormal Client Behavior Detection in Federated Learning Authors: Suyi Li, Yong Cheng, Yang Liu, Wei Wang, Tianjian Chen | Published: 2019-10-22 | Updated: 2019-12-06 Client Contribution AssessmentPoisoningAnomaly Detection Method 2019.10.22 2025.05.28 Literature Database
Edge Dithering for Robust Adaptive Graph Convolutional Networks Authors: Vassilis N. Ioannidis, Georgios B. Giannakis | Published: 2019-10-21 Graph Neural NetworkPoisoningModel Architecture 2019.10.21 2025.05.28 Literature Database
Recovering Localized Adversarial Attacks Authors: Jan Philip Göpfert, Heiko Wersing, Barbara Hammer | Published: 2019-10-21 PoisoningAdversarial LearningFeature Importance Analysis 2019.10.21 2025.05.28 Literature Database
Enforcing Linearity in DNN succours Robustness and Adversarial Image Generation Authors: Anindya Sarkar, Nikhil Kumar Gupta, Raghu Iyengar | Published: 2019-10-17 | Updated: 2019-10-21 PoisoningAdversarial LearningAdversarial Example 2019.10.17 2025.05.28 Literature Database
Confidence-Calibrated Adversarial Training: Generalizing to Unseen Attacks Authors: David Stutz, Matthias Hein, Bernt Schiele | Published: 2019-10-14 | Updated: 2020-06-30 PoisoningAttack EvaluationAdversarial Attack Methods 2019.10.14 2025.05.28 Literature Database
Eavesdrop the Composition Proportion of Training Labels in Federated Learning Authors: Lixu Wang, Shichao Xu, Xiao Wang, Qi Zhu | Published: 2019-10-14 | Updated: 2019-10-27 Backdoor AttackPoisoningAttack Evaluation 2019.10.14 2025.05.28 Literature Database
Detecting AI Trojans Using Meta Neural Analysis Authors: Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li | Published: 2019-10-08 | Updated: 2020-10-01 Backdoor AttackPoisoningAttack Evaluation 2019.10.08 2025.05.28 Literature Database
Adversarial Examples for Cost-Sensitive Classifiers Authors: Gavin S. Hartnett, Andrew J. Lohn, Alexander P. Sedlack | Published: 2019-10-04 PoisoningAttack EvaluationAdversarial Attack Methods 2019.10.04 2025.05.28 Literature Database
BUZz: BUffer Zones for defending adversarial examples in image classification Authors: Kaleel Mahmood, Phuong Ha Nguyen, Lam M. Nguyen, Thanh Nguyen, Marten van Dijk | Published: 2019-10-03 | Updated: 2020-06-16 PoisoningAttack EvaluationAdversarial Attack Methods 2019.10.03 2025.05.28 Literature Database
Cross-Layer Strategic Ensemble Defense Against Adversarial Examples Authors: Wenqi Wei, Ling Liu, Margaret Loper, Ka-Ho Chow, Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2019-10-01 PoisoningAttack EvaluationAdversarial Example 2019.10.01 2025.05.28 Literature Database