SOTAVerified

Data Poisoning

Data Poisoning is an adversarial attack that tries to manipulate the training dataset in order to control the prediction behavior of a trained model such that the model will label malicious examples into a desired classes (e.g., labeling spam e-mails as safe).

Source: Explaining Vulnerabilities to Adversarial Machine Learning through Visual Analytics

Papers

Showing 376400 of 492 papers

TitleStatusHype
Adversarial Vulnerability of Active Transfer Learning0
Data Poisoning Attacks to Deep Learning Based Recommender Systems0
CLEAR: Clean-Up Sample-Targeted Backdoor in Neural Networks0
Active Learning Under Malicious Mislabeling and Poisoning Attacks0
Sself: Robust Federated Learning against Stragglers and Adversaries0
Just How Toxic is Data Poisoning? A Benchmark for Backdoor and Data Poisoning Attacks0
Federated Unlearning0
Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses0
Exacerbating Algorithmic Bias through Fairness AttacksCode0
Influence-Driven Data Poisoning in Graph-Based Semi-Supervised Classifiers0
Mitigating the Impact of Adversarial Attacks in Very Deep Networks0
Certified Robustness of Nearest Neighbors against Data Poisoning and Backdoor Attacks0
How Robust are Randomized Smoothing based Defenses to Data Poisoning?0
Lethean Attack: An Online Data Poisoning TechniqueCode0
Dimensionality reduction, regularization, and generalization in overparameterized regressionsCode0
Strong Data Augmentation Sanitizes Poisoning and Backdoor Attacks Without an Accuracy TradeoffCode1
Bait and Switch: Online Training Data Poisoning of Autonomous Driving Systems0
A Targeted Attack on Black-Box Neural Machine Translation with Parallel Data Poisoning0
Model-Agnostic Explanations using Minimal Forcing Subsets0
Concealed Data Poisoning Attacks on NLP Models0
GFL: A Decentralized Federated Learning Framework Based On Blockchain0
VenoMave: Targeted Poisoning Against Speech RecognitionCode0
Sniper GMMs: Structured Gaussian mixtures poison ML on large n small p data with high efficacy0
Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing0
Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems0
Show:102550
← PrevPage 16 of 20Next →

No leaderboard results yet.