Attack Methods against DFL

Decentralized Federated Learning: A Survey on Security and Privacy

Authors: Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif, Boyu Wang, Qiang Yang | Published: 2024-01-25
Attack Methods against DFL
Backdoor Attack
Privacy Protection Method

Semi-Leak: Membership Inference Attacks Against Semi-supervised Learning

Authors: Xinlei He, Hongbin Liu, Neil Zhenqiang Gong, Yang Zhang | Published: 2022-07-25
Attack Methods against DFL
Membership Inference
Model Performance Evaluation

MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning

Authors: Hua Ma, Qun Li, Yifeng Zheng, Zhi Zhang, Xiaoning Liu, Yansong Gao, Said F. Al-Sarawi, Derek Abbott | Published: 2022-07-19
Attack Methods against DFL
Privacy Enhancing Technology
Poisoning

Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware

Authors: Luca Demetrio, Battista Biggio, Fabio Roli | Published: 2022-07-12
Attack Methods against DFL
Poisoning
Malware Propagation Means

FL-Defender: Combating Targeted Attacks in Federated Learning

Authors: Najeeb Jebreel, Josep Domingo-Ferrer | Published: 2022-07-02
Attack Methods against DFL
Algorithm Design
Poisoning

Private Graph Extraction via Feature Explanations

Authors: Iyiola E. Olatunji, Mandeep Rathee, Thorben Funke, Megha Khosla | Published: 2022-06-29 | Updated: 2023-11-02
Attack Methods against DFL
Privacy Risk Management
Adversarial Learning

Deep Leakage from Model in Federated Learning

Authors: Zihao Zhao, Mengen Luo, Wenbo Ding | Published: 2022-06-10
Attack Methods against DFL
Poisoning
Federated Learning

Membership Inference via Backdooring

Authors: Hongsheng Hu, Zoran Salcic, Gillian Dobbie, Jinjun Chen, Lichao Sun, Xuyun Zhang | Published: 2022-06-10
Attack Methods against DFL
Membership Inference
Adversarial Attack Methods

Gradient Obfuscation Gives a False Sense of Security in Federated Learning

Authors: Kai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai | Published: 2022-06-08 | Updated: 2022-10-14
Attack Methods against DFL
Poisoning
Reconstruction Durability

Data Stealing Attack on Medical Images: Is it Safe to Export Networks from Data Lakes?

Authors: Huiyu Li, Nicholas Ayache, Hervé Delingette | Published: 2022-06-07
Attack Methods against DFL
Privacy Assessment
Membership Inference