SOTAVerified

Data Poisoning

Data Poisoning is an adversarial attack that tries to manipulate the training dataset in order to control the prediction behavior of a trained model such that the model will label malicious examples into a desired classes (e.g., labeling spam e-mails as safe).

Source: Explaining Vulnerabilities to Adversarial Machine Learning through Visual Analytics

Papers

Showing 101125 of 492 papers

TitleStatusHype
Atlas: A Framework for ML Lifecycle Provenance & Transparency0
Chameleon: Increasing Label-Only Membership Leakage with Adaptive Poisoning0
Class Machine Unlearning for Complex Data via Concepts Inference and Data Poisoning0
Data Poisoning Attacks on EEG Signal-based Risk Assessment Systems0
Clean Image May be Dangerous: Data Poisoning Attacks Against Deep Hashing0
Clean Label Attacks against SLU Systems0
Certified Robustness to Label-Flipping Attacks via Randomized Smoothing0
CLEAR: Clean-Up Sample-Targeted Backdoor in Neural Networks0
Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks0
Compression-Resistant Backdoor Attack against Deep Neural Networks0
Computation and Data Efficient Backdoor Attacks0
Concealing Backdoor Model Updates in Federated Learning by Trigger-Optimized Data Poisoning0
Data Poisoning Attacks on Factorization-Based Collaborative Filtering0
ControlNET: A Firewall for RAG-based LLM System0
Certified Robustness to Adversarial Label-Flipping Attacks via Randomized Smoothing0
Certified Robustness of Nearest Neighbors against Data Poisoning and Backdoor Attacks0
Concealed Data Poisoning Attacks on NLP Models0
Cut the Deadwood Out: Post-Training Model Purification with Selective Module Substitution0
CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation0
Data and Model Poisoning Backdoor Attacks on Wireless Federated Learning, and the Defense Mechanisms: A Comprehensive Survey0
Data-Dependent Stability Analysis of Adversarial Training0
Data-Driven Control and Data-Poisoning attacks in Buildings: the KTH Live-In Lab case study0
Provable Training of a ReLU Gate with an Iterative Non-Gradient Algorithm0
Data Poisoning: An Overlooked Threat to Power Grid Resilience0
A Robust Attack: Displacement Backdoor Attack0
Show:102550
← PrevPage 5 of 20Next →

No leaderboard results yet.