Poisoning Web-Scale Training Datasets is Practical

Authors: Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum Anderson, Andreas Terzis, Kurt Thomas, Florian Tramèr | Published: 2023-02-20 | Updated: 2024-05-06

Certified private data release for sparse Lipschitz functions

Authors: Konstantin Donhauser, Johan Lokna, Amartya Sanyal, March Boedihardjo, Robert Hönig, Fanny Yang | Published: 2023-02-19 | Updated: 2023-08-28

Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective

Authors: Baoyuan Wu, Zihao Zhu, Li Liu, Qingshan Liu, Zhaofeng He, Siwei Lyu | Published: 2023-02-19 | Updated: 2024-01-04

Marich: A Query-efficient Distributionally Equivalent Model Extraction Attack using Public Data

Authors: Pratik Karmakar, Debabrota Basu | Published: 2023-02-16 | Updated: 2023-10-18

Large Language Models for Code: Security Hardening and Adversarial Testing

Authors: Jingxuan He, Martin Vechev | Published: 2023-02-10 | Updated: 2024-08-16

Mithridates: Auditing and Boosting Backdoor Resistance of Machine Learning Pipelines

Authors: Eugene Bagdasaryan, Vitaly Shmatikov | Published: 2023-02-09 | Updated: 2023-12-19

Continuous Learning for Android Malware Detection

Authors: Yizheng Chen, Zhoujie Ding, David Wagner | Published: 2023-02-08 | Updated: 2023-06-14

CodeLMSec Benchmark: Systematically Evaluating and Finding Security Vulnerabilities in Black-Box Code Language Models

Authors: Hossein Hajipour, Keno Hassler, Thorsten Holz, Lea Schönherr, Mario Fritz | Published: 2023-02-08 | Updated: 2023-10-23

Temporal Robustness against Data Poisoning

Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-02-07 | Updated: 2023-12-06

SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification

Authors: Gorka Abad, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek, Mauro Conti | Published: 2023-02-03 | Updated: 2023-04-21