ポイズニング

PoisonBench: Assessing Large Language Model Vulnerability to Data Poisoning

Authors: Tingchen Fu, Mrinank Sharma, Philip Torr, Shay B. Cohen, David Krueger, Fazl Barez | Published: 2024-10-11
LLM性能評価
バックドア攻撃
ポイズニング

Data Taggants: Dataset Ownership Verification via Harmless Targeted Data Poisoning

Authors: Wassim Bouaziz, El-Mahdi El-Mhamdi, Nicolas Usunier | Published: 2024-10-09
ポイズニング

CAT: Concept-level backdoor ATtacks for Concept Bottleneck Models

Authors: Songning Lai, Jiayu Yang, Yu Huang, Lijie Hu, Tianlang Xue, Zhangyi Hu, Jiaxu Li, Haicheng Liao, Yutao Yue | Published: 2024-10-07
バックドア攻撃
ポイズニング

Federated Learning Nodes Can Reconstruct Peers’ Image Data

Authors: Ethan Wilson, Kai Yue, Chau-Wai Wong, Huaiyu Dai | Published: 2024-10-07
プライバシー保護
ポイズニング

Empirical Perturbation Analysis of Linear System Solvers from a Data Poisoning Perspective

Authors: Yixin Liu, Arielle Carr, Lichao Sun | Published: 2024-10-01
バックドア攻撃
ポイズニング
線形ソルバー

Timber! Poisoning Decision Trees

Authors: Stefano Calzavara, Lorenzo Cazzaro, Massimo Vettori | Published: 2024-10-01
バックドア攻撃
ポイズニング

The poison of dimensionality

Authors: Lê-Nguyên Hoang | Published: 2024-09-25
ポイズニング
モデル性能評価
損失関数

MalMixer: Few-Shot Malware Classification with Retrieval-Augmented Semi-Supervised Learning

Authors: Jiliang Li, Yifan Zhang, Yu Huang, Kevin Leach | Published: 2024-09-20 | Updated: 2025-04-15
データ拡張手法
ポイズニング
限られたサンプルでのマルウェア検出

Federated Learning for Smart Grid: A Survey on Applications and Potential Vulnerabilities

Authors: Zikai Zhang, Suman Rath, Jiaohao Xu, Tingsong Xiao | Published: 2024-09-16
エネルギー管理
プライバシー保護
ポイズニング

On the Vulnerability of Applying Retrieval-Augmented Generation within Knowledge-Intensive Application Domains

Authors: Xun Xian, Ganghua Wang, Xuan Bi, Jayanth Srinivasa, Ashish Kundu, Charles Fleming, Mingyi Hong, Jie Ding | Published: 2024-09-12
RAG
ポイズニング