Backdoor Federated Learning by Poisoning Backdoor-Critical Layers Authors: Haomin Zhuang, Mingxian Yu, Hao Wang, Yang Hua, Jian Li, Xu Yuan | Published: 2023-08-08 | Updated: 2024-04-15 Backdoor AttackPoisoning AttackDefense Method 2023.08.08 2025.05.28 Literature Database
A reading survey on adversarial machine learning: Adversarial attacks and their understanding Authors: Shashank Kotyan | Published: 2023-08-07 Adversarial ExampleAdversarial Attack MethodsDefense Method 2023.08.07 2025.05.28 Literature Database
Membership Inference Attacks against Language Models via Neighbourhood Comparison Authors: Justus Mattern, Fatemehsadat Mireshghallah, Zhijing Jin, Bernhard Schölkopf, Mrinmaya Sachan, Taylor Berg-Kirkpatrick | Published: 2023-05-29 | Updated: 2023-08-07 LLM Performance EvaluationPrivacy Protection MethodDefense Method 2023.05.29 2025.05.28 Literature Database
COLLIDER: A Robust Training Framework for Backdoor Data Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2022-10-13 Core Set Selection MethodDeep Learning MethodDefense Method 2022.10.13 2025.05.28 Literature Database
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Intra-Group-based Authentication with DRAM-PUFs Using Machine Learning Authors: Owen Millwood, Jack Miskelly, Bohao Yang, Prosanta Gope, Elif Kavun, Chenghua Lin | Published: 2022-07-11 Algorithm DesignModel Design and AccuracyDefense Method 2022.07.11 2025.05.28 Literature Database
How many perturbations break this model? Evaluating robustness beyond adversarial accuracy Authors: Raphael Olivier, Bhiksha Raj | Published: 2022-07-08 | Updated: 2023-08-10 Model Design and AccuracyAdversarial TrainingDefense Method 2022.07.08 2025.05.28 Literature Database
Federated and Transfer Learning: A Survey on Adversaries and Defense Mechanisms Authors: Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif | Published: 2022-07-05 Privacy ProtectionPoisoningDefense Method 2022.07.05 2025.05.28 Literature Database
Defending against the Label-flipping Attack in Federated Learning Authors: Najeeb Moharram Jebreel, Josep Domingo-Ferrer, David Sánchez, Alberto Blanco-Justicia | Published: 2022-07-05 Algorithm DesignPoisoningDefense Method 2022.07.05 2025.05.28 Literature Database
Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems Authors: Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique | Published: 2022-04-18 Backdoor AttackMembership InferenceDefense Method 2022.04.18 2025.05.28 Literature Database
Machine Learning Security against Data Poisoning: Are We There Yet? Authors: Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo | Published: 2022-04-12 | Updated: 2024-03-08 PoisoningAttack TypeDefense Method 2022.04.12 2025.05.28 Literature Database