毒データの検知

Using Anomaly Detection to Detect Poisoning Attacks in Federated Learning Applications

Authors: Ali Raza, Shujun Li, Kim-Phuc Tran, Ludovic Koehl, Kim Duc Tran | Published: 2022-07-18 | Updated: 2025-03-25
ポイズニング
悪意のあるクライアント
毒データの検知

Deep k-NN Defense against Clean-label Data Poisoning Attacks

Authors: Neehar Peri, Neal Gupta, W. Ronny Huang, Liam Fowl, Chen Zhu, Soheil Feizi, Tom Goldstein, John P. Dickerson | Published: 2019-09-29 | Updated: 2020-08-13
バックドア攻撃
性能評価
毒データの検知

Is feature selection secure against training data poisoning?

Authors: Huang Xiao, Battista Biggio, Gavin Brown, Giorgio Fumera, Claudia Eckert, Fabio Roli | Published: 2018-04-21
ポイズニング
毒データの検知
毒性攻撃に特化した内容

Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks

Authors: Ali Shafahi, W. Ronny Huang, Mahyar Najibi, Octavian Suciu, Christoph Studer, Tudor Dumitras, Tom Goldstein | Published: 2018-04-03 | Updated: 2018-11-10
バックドア攻撃
ポイズニング
毒データの検知

Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning

Authors: Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, Bo Li | Published: 2018-04-01 | Updated: 2021-09-28
ポイズニング
損失関数
毒データの検知

BEBP: An Poisoning Method Against Machine Learning Based IDSs

Authors: Pan Li, Qiang Liu, Wentao Zhao, Dongxu Wang, Siqi Wang | Published: 2018-03-11
データ生成手法
バックドア攻撃
毒データの検知

Label Sanitization against Label Flipping Poisoning Attacks

Authors: Andrea Paudice, Luis Muñoz-González, Emil C. Lupu | Published: 2018-03-02 | Updated: 2018-10-02
敵対的攻撃分析
機械学習技術
毒データの検知

Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection

Authors: Andrea Paudice, Luis Muñoz-González, Andras Gyorgy, Emil C. Lupu | Published: 2018-02-08
ポイズニング
敵対的攻撃
毒データの検知

Automated Poisoning Attacks and Defenses in Malware Detection Systems: An Adversarial Machine Learning Approach

Authors: Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu, Bo Li | Published: 2017-06-13 | Updated: 2017-10-31
マルウェア分類
毒データの検知
特徴選択手法

Certified Defenses for Data Poisoning Attacks

Authors: Jacob Steinhardt, Pang Wei Koh, Percy Liang | Published: 2017-06-09 | Updated: 2017-11-24
ポイズニング
最適化問題
毒データの検知