Watch Out for Your Guidance on Generation! Exploring Conditional Backdoor Attacks against Large Language Models Authors: Jiaming He, Wenbo Jiang, Guanyu Hou, Wenshu Fan, Rui Zhang, Hongwei Li | Published: 2024-04-23 | Updated: 2025-01-08 LLM SecurityBackdoor AttackPoisoning 2024.04.23 2025.05.27 Literature Database
Aggressive or Imperceptible, or Both: Network Pruning Assisted Hybrid Byzantines in Federated Learning Authors: Emre Ozfatura, Kerem Ozfatura, Alptekin Kupcu, Deniz Gunduz | Published: 2024-04-09 PoisoningAttack MethodDefense Method 2024.04.09 2025.05.27 Literature Database
Enabling Privacy-Preserving Cyber Threat Detection with Federated Learning Authors: Yu Bi, Yekai Li, Xuan Feng, Xianghang Mi | Published: 2024-04-08 Spam DetectionPoisoningFederated Learning 2024.04.08 2025.05.27 Literature Database
Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated Learning Authors: K Naveen Kumar, C Krishna Mohan, Aravind Machiry | Published: 2024-04-05 PoisoningFederated LearningDefense Method 2024.04.05 2025.05.27 Literature Database
Privacy Backdoors: Enhancing Membership Inference through Poisoning Pre-trained Models Authors: Yuxin Wen, Leo Marchyok, Sanghyun Hong, Jonas Geiping, Tom Goldstein, Nicholas Carlini | Published: 2024-04-01 Backdoor AttackPoisoningMembership Inference 2024.04.01 2025.05.27 Literature Database
A Backdoor Approach with Inverted Labels Using Dirty Label-Flipping Attacks Authors: Orson Mengara | Published: 2024-03-29 | Updated: 2024-04-07 Dataset GenerationBackdoor AttackPoisoning 2024.03.29 2025.05.27 Literature Database
Resilience in Online Federated Learning: Mitigating Model-Poisoning Attacks via Partial Sharing Authors: Ehsan Lari, Reza Arablouei, Vinay Chakravarthi Gogineni, Stefan Werner | Published: 2024-03-19 | Updated: 2024-08-16 PoisoningCommunication EfficiencyFederated Learning 2024.03.19 2025.05.27 Literature Database
Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency Authors: Soumyadeep Pal, Yuguang Yao, Ren Wang, Bingquan Shen, Sijia Liu | Published: 2024-03-15 WatermarkingBackdoor AttackPoisoning 2024.03.15 2025.05.27 Literature Database
Visual Privacy Auditing with Diffusion Models Authors: Kristian Schwethelm, Johannes Kaiser, Moritz Knolle, Daniel Rueckert, Georgios Kaissis, Alexander Ziller | Published: 2024-03-12 WatermarkingPoisoningReconstruction Durability 2024.03.12 2025.05.27 Literature Database
Poisoning Programs by Un-Repairing Code: Security Concerns of AI-generated Code Authors: Cristina Improta | Published: 2024-03-11 Security AnalysisBackdoor AttackPoisoning 2024.03.11 2025.05.27 Literature Database