Attack Methods against DFL

Subject Membership Inference Attacks in Federated Learning

Authors: Anshuman Suri, Pallika Kanani, Virendra J. Marathe, Daniel W. Peterson | Published: 2022-06-07 | Updated: 2023-06-02
Attack Methods against DFL
Membership Inference
Federated Learning

Defense Against Gradient Leakage Attacks via Learning to Obscure Data

Authors: Yuxuan Wan, Han Xu, Xiaorui Liu, Jie Ren, Wenqi Fan, Jiliang Tang | Published: 2022-06-01
Attack Methods against DFL
Privacy Assessment
Poisoning

Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems

Authors: Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo | Published: 2022-05-31 | Updated: 2022-08-12
Attack Methods against DFL
Backdoor Attack
User Activity Analysis

White-box Membership Attack Against Machine Learning Based Retinopathy Classification

Authors: Mounia Hamidouche, Reda Bellafqira, Gwenolé Quellec, Gouenou Coatrieux | Published: 2022-05-30
Attack Methods against DFL
Adversarial Attack Methods

Robust Quantity-Aware Aggregation for Federated Learning

Authors: Jingwei Yi, Fangzhao Wu, Huishuai Zhang, Bin Zhu, Tao Qi, Guangzhong Sun, Xing Xie | Published: 2022-05-22 | Updated: 2023-07-26
Attack Methods against DFL
Secure Aggregation
Robustness Evaluation

Focused Adversarial Attacks

Authors: Thomas Cilloni, Charles Walter, Charles Fleming | Published: 2022-05-19
Attack Methods against DFL
Attack Type
Adversarial Example

Backdoor Attacks on Bayesian Neural Networks using Reverse Distribution

Authors: Zhixin Pan, Prabhat Mishra | Published: 2022-05-18
Attack Methods against DFL
Backdoor Attack
Performance Evaluation

On the (In)security of Peer-to-Peer Decentralized Machine Learning

Authors: Dario Pasquini, Mathilde Raynal, Carmela Troncoso | Published: 2022-05-17 | Updated: 2023-11-10
Attack Methods against DFL
Privacy Technique
Privacy Leakage

DualCF: Efficient Model Extraction Attack from Counterfactual Explanations

Authors: Yongjie Wang, Hangwei Qian, Chunyan Miao | Published: 2022-05-13
Attack Methods against DFL
Query Generation Method
Attack Method

A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Predictions

Authors: Yong Xie, Dakuo Wang, Pin-Yu Chen, Jinjun Xiong, Sijia Liu, Sanmi Koyejo | Published: 2022-05-01 | Updated: 2022-07-12
Attack Methods against DFL
Cyber Threat
Attack Type