Subject Membership Inference Attacks in Federated Learning Authors: Anshuman Suri, Pallika Kanani, Virendra J. Marathe, Daniel W. Peterson | Published: 2022-06-07 | Updated: 2023-06-02 Attack Methods against DFLMembership InferenceFederated Learning 2022.06.07 2025.05.28 Literature Database
Defense Against Gradient Leakage Attacks via Learning to Obscure Data Authors: Yuxuan Wan, Han Xu, Xiaorui Liu, Jie Ren, Wenqi Fan, Jiliang Tang | Published: 2022-06-01 Attack Methods against DFLPrivacy AssessmentPoisoning 2022.06.01 2025.05.28 Literature Database
Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems Authors: Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo | Published: 2022-05-31 | Updated: 2022-08-12 Attack Methods against DFLBackdoor AttackUser Activity Analysis 2022.05.31 2025.05.28 Literature Database
White-box Membership Attack Against Machine Learning Based Retinopathy Classification Authors: Mounia Hamidouche, Reda Bellafqira, Gwenolé Quellec, Gouenou Coatrieux | Published: 2022-05-30 Attack Methods against DFLAdversarial Attack Methods 2022.05.30 2025.05.28 Literature Database
Robust Quantity-Aware Aggregation for Federated Learning Authors: Jingwei Yi, Fangzhao Wu, Huishuai Zhang, Bin Zhu, Tao Qi, Guangzhong Sun, Xing Xie | Published: 2022-05-22 | Updated: 2023-07-26 Attack Methods against DFLSecure AggregationRobustness Evaluation 2022.05.22 2025.05.28 Literature Database
Focused Adversarial Attacks Authors: Thomas Cilloni, Charles Walter, Charles Fleming | Published: 2022-05-19 Attack Methods against DFLAttack TypeAdversarial Example 2022.05.19 2025.05.28 Literature Database
Backdoor Attacks on Bayesian Neural Networks using Reverse Distribution Authors: Zhixin Pan, Prabhat Mishra | Published: 2022-05-18 Attack Methods against DFLBackdoor AttackPerformance Evaluation 2022.05.18 2025.05.28 Literature Database
On the (In)security of Peer-to-Peer Decentralized Machine Learning Authors: Dario Pasquini, Mathilde Raynal, Carmela Troncoso | Published: 2022-05-17 | Updated: 2023-11-10 Attack Methods against DFLPrivacy TechniquePrivacy Leakage 2022.05.17 2025.05.28 Literature Database
DualCF: Efficient Model Extraction Attack from Counterfactual Explanations Authors: Yongjie Wang, Hangwei Qian, Chunyan Miao | Published: 2022-05-13 Attack Methods against DFLQuery Generation MethodAttack Method 2022.05.13 2025.05.28 Literature Database
A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Predictions Authors: Yong Xie, Dakuo Wang, Pin-Yu Chen, Jinjun Xiong, Sijia Liu, Sanmi Koyejo | Published: 2022-05-01 | Updated: 2022-07-12 Attack Methods against DFLCyber ThreatAttack Type 2022.05.01 2025.05.28 Literature Database