A Backdoor Approach with Inverted Labels Using Dirty Label-Flipping Attacks Authors: Orson Mengara | Published: 2024-03-29 | Updated: 2024-04-07 Dataset GenerationBackdoor AttackPoisoning 2024.03.29 2025.05.27 Literature Database
Resilience in Online Federated Learning: Mitigating Model-Poisoning Attacks via Partial Sharing Authors: Ehsan Lari, Reza Arablouei, Vinay Chakravarthi Gogineni, Stefan Werner | Published: 2024-03-19 | Updated: 2024-08-16 PoisoningCommunication EfficiencyFederated Learning 2024.03.19 2025.05.27 Literature Database
Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency Authors: Soumyadeep Pal, Yuguang Yao, Ren Wang, Bingquan Shen, Sijia Liu | Published: 2024-03-15 WatermarkingBackdoor AttackPoisoning 2024.03.15 2025.05.27 Literature Database
Visual Privacy Auditing with Diffusion Models Authors: Kristian Schwethelm, Johannes Kaiser, Moritz Knolle, Daniel Rueckert, Georgios Kaissis, Alexander Ziller | Published: 2024-03-12 WatermarkingPoisoningReconstruction Durability 2024.03.12 2025.05.27 Literature Database
Poisoning Programs by Un-Repairing Code: Security Concerns of AI-generated Code Authors: Cristina Improta | Published: 2024-03-11 Security AnalysisBackdoor AttackPoisoning 2024.03.11 2025.05.27 Literature Database
Provable Mutual Benefits from Federated Learning in Privacy-Sensitive Domains Authors: Nikita Tsoy, Anna Mihalkova, Teodora Todorova, Nikola Konstantinov | Published: 2024-03-11 | Updated: 2024-11-07 PoisoningOptimization ProblemFederated Learning 2024.03.11 2025.05.27 Literature Database
Fake or Compromised? Making Sense of Malicious Clients in Federated Learning Authors: Hamid Mozaffari, Sunav Choudhary, Amir Houmansadr | Published: 2024-03-10 Backdoor AttackPoisoningMalicious Client 2024.03.10 2025.05.27 Literature Database
Enhancing Security in Federated Learning through Adaptive Consensus-Based Model Update Validation Authors: Zahir Alsulaimawi | Published: 2024-03-05 PoisoningFederated LearningDefense Method 2024.03.05 2025.05.27 Literature Database
Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees Authors: Ehsan Nowroozi, Nada Jadalla, Samaneh Ghelichkhani, Alireza Jolfaei | Published: 2024-03-05 Backdoor AttackPoisoningDefense Method 2024.03.05 2025.05.27 Literature Database
Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks Authors: Ehsan Nowroozi, Imran Haider, Rahim Taheri, Mauro Conti | Published: 2024-03-05 Backdoor AttackPoisoningFederated Learning 2024.03.05 2025.05.27 Literature Database