ポイズニング攻撃

Scalable and Communication-efficient Decentralized Federated Edge Learning with Multi-blockchain Framework

Authors: Jiawen Kang, Zehui Xiong, Chunxiao Jiang, Yi Liu, Song Guo, Yang Zhang, Dusit Niyato, Cyril Leung, Chunyan Miao | Published: 2020-08-10
ポイズニング攻撃
機械学習フレームワーク
通信効率

Subpopulation Data Poisoning Attacks

Authors: Matthew Jagielski, Giorgio Severi, Niklas Pousette Harger, Alina Oprea | Published: 2020-06-24 | Updated: 2021-05-12
バックドア攻撃
ポイズニング
ポイズニング攻撃

Just How Toxic is Data Poisoning? A Unified Benchmark for Backdoor and Data Poisoning Attacks

Authors: Avi Schwarzschild, Micah Goldblum, Arjun Gupta, John P Dickerson, Tom Goldstein | Published: 2020-06-22 | Updated: 2021-06-17
ポイズニング
ポイズニング攻撃
攻撃手法

With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models

Authors: Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Alina Oprea, Haifeng Qian | Published: 2020-06-21 | Updated: 2021-05-19
ポイズニング
ポイズニング攻撃
線形回帰

Deep Probabilistic Models to Detect Data Poisoning Attacks

Authors: Mahesh Subedar, Nilesh Ahuja, Ranganath Krishnan, Ibrahima J. Ndiour, Omesh Tickoo | Published: 2019-12-03
バックドア攻撃
ポイズニング攻撃
性能評価

Biscotti: A Ledger for Private and Secure Peer-to-Peer Machine Learning

Authors: Muhammad Shayan, Clement Fung, Chris J. M. Yoon, Ivan Beschastnikh | Published: 2018-11-24 | Updated: 2019-12-12
ポイズニング攻撃
差分プライバシー
連合学習

Dancing in the Dark: Private Multi-Party Machine Learning in an Untrusted Setting

Authors: Clement Fung, Jamie Koerner, Stewart Grant, Ivan Beschastnikh | Published: 2018-11-23 | Updated: 2019-02-24
プライバシー保護
ポイズニング攻撃
モデル抽出攻撃

Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering

Authors: Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian Molloy, Biplav Srivastava | Published: 2018-11-09
バックドア攻撃対策
バックドア攻撃用の毒データの検知
ポイズニング攻撃

Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference

Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Muhammad Shafique | Published: 2018-11-05
IoTセキュリティ
ポイズニング攻撃
モデル抽出攻撃