バックドア攻撃

Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators

Authors: Hongye Xu, Dongfang Liu, Cory Merkel, Michael Zuzak | Published: 2023-04-12 | Updated: 2023-04-14
DNN IP保護手法
ウォーターマーキング
バックドア攻撃

Rethinking the Trigger-injecting Position in Graph Backdoor Attack

Authors: Jing Xu, Gorka Abad, Stjepan Picek | Published: 2023-04-05 | Updated: 2023-04-18
GNN
バックドア攻撃
特徴選択手法

Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective

Authors: Baoyuan Wu, Zihao Zhu, Li Liu, Qingshan Liu, Zhaofeng He, Siwei Lyu | Published: 2023-02-19 | Updated: 2024-01-04
バックドア攻撃
プロンプトインジェクション
ポイズニング攻撃

Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness

Authors: Bao Gia Doan, Shuiqiao Yang, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2023-01-30
バックドア攻撃
ベイジアン敵対的学習
ポイズニング

Backdoor Attacks in Peer-to-Peer Federated Learning

Authors: Georgios Syros, Gokberk Yar, Simona Boboila, Cristina Nita-Rotaru, Alina Oprea | Published: 2023-01-23 | Updated: 2024-09-17
バックドア攻撃
ポイズニング
悪意のある行為者の分類

Towards Understanding How Self-training Tolerates Data Backdoor Poisoning

Authors: Soumyadeep Pal, Ren Wang, Yuguang Yao, Sijia Liu | Published: 2023-01-20
バックドア攻撃
ポイズニング
自己学習手法

TrojanPuzzle: Covertly Poisoning Code-Suggestion Models

Authors: Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim | Published: 2023-01-06 | Updated: 2024-01-24
バックドア攻撃
ポイズニング
攻撃手法

Backdoor Attacks Against Dataset Distillation

Authors: Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang | Published: 2023-01-03
DNN IP保護手法
バックドア攻撃
ポイズニング

Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector

Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam | Published: 2023-01-03
バックドア攻撃
ポイズニング
性能評価

Unlocking Metaverse-as-a-Service The three pillars to watch: Privacy and Security, Edge Computing, and Blockchain

Authors: Vesal Ahsani, Ali Rahimi, Mehdi Letafati, Babak Hossein Khalaj | Published: 2023-01-01 | Updated: 2023-01-11
バックドア攻撃
プライバシー保護技術
ブロックチェーン統合