SOTAVerified

Data Poisoning

Data Poisoning is an adversarial attack that tries to manipulate the training dataset in order to control the prediction behavior of a trained model such that the model will label malicious examples into a desired classes (e.g., labeling spam e-mails as safe).

Source: Explaining Vulnerabilities to Adversarial Machine Learning through Visual Analytics

Papers

Showing 251300 of 492 papers

TitleStatusHype
Unlearnable Clusters: Towards Label-agnostic Unlearnable ExamplesCode1
Hidden Poison: Machine Unlearning Enables Camouflaged Poisoning AttacksCode1
Defending Against Disinformation Attacks in Open-Domain Question AnsweringCode0
Pre-trained Encoders in Self-Supervised Learning Improve Secure and Privacy-preserving Supervised Learning0
Rethinking Backdoor Data Poisoning Attacks in the Context of Semi-Supervised Learning0
Backdoor Vulnerabilities in Normally Trained Deep Learning Models0
Data Poisoning Attack Aiming the Vulnerability of Continual Learning0
Adversarial Attacks are a Surprisingly Strong Baseline for Poisoning Few-Shot Meta-Learners0
Analysis and Detectability of Offline Data Poisoning Attacks on Linear Dynamical SystemsCode0
CorruptEncoder: Data Poisoning based Backdoor Attacks to Contrastive LearningCode1
Backdoor Attacks for Remote Sensing Data with Wavelet TransformCode1
FLock: Defending Malicious Behaviors in Federated Learning with Blockchain0
Try to Avoid Attacks: A Federated Data Sanitization Defense for Healthcare IoMT Systems0
Generative Poisoning Using Random DiscriminatorsCode1
Amplifying Membership Exposure via Data PoisoningCode1
FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-based Node Classification0
Analyzing the Robustness of Decentralized Horizontal and Vertical Federated Learning Architectures in a Non-IID Scenario0
Training set cleansing of backdoor poisoning by self-supervised representation learning0
Not All Poisons are Created Equal: Robust Training against Data PoisoningCode1
How to Sift Out a Clean Data Subset in the Presence of Data Poisoning?Code1
Detecting Backdoors in Deep Text Classifiers0
On Optimal Learning Under Targeted Data Poisoning0
Understanding Influence Functions and Datamodels via Harmonic Analysis0
Data Poisoning Attacks Against Multimodal EncodersCode1
Adversarial Robustness of Representation Learning for Knowledge GraphsCode1
On the Robustness of Random Forest Against Untargeted Data Poisoning: An Ensemble-Based ApproachCode0
Defend Data Poisoning Attacks on Voice Authentication0
FedPrompt: Communication-Efficient and Privacy Preserving Prompt Tuning in Federated Learning0
Do-AIQ: A Design-of-Experiment Approach to Quality Evaluation of AI Mislabel Detection Algorithm0
Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System0
Neural network fragile watermarking with no model performance degradation0
Friendly Noise against Adversarial Noise: A Powerful Defense against Data Poisoning AttacksCode1
Lethal Dose Conjecture on Data PoisoningCode0
Testing the Robustness of Learned Index StructuresCode0
Using Anomaly Detection to Detect Poisoning Attacks in Federated Learning Applications0
Backdoor Attacks on Crowd CountingCode1
Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain0
Backdoor Attack is a Devil in Federated GAN-based Medical Image SynthesisCode0
Robustness Evaluation of Deep Unsupervised Learning Algorithms for Intrusion Detection SystemsCode1
Autoregressive Perturbations for Data PoisoningCode1
Efficient Reward Poisoning Attacks on Online Deep Reinforcement LearningCode0
BagFlip: A Certified Defense against Data PoisoningCode0
SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning0
PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in Contrastive Learning0
Federated Multi-Armed Bandits Under Byzantine Attacks0
VPN: Verification of Poisoning in Neural Networks0
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning0
GFCL: A GRU-based Federated Continual Learning Framework against Data Poisoning Attacks in IoV0
Federated Learning: Balancing the Thin Line Between Data Intelligence and Privacy0
Indiscriminate Data Poisoning Attacks on Neural NetworksCode0
Show:102550
← PrevPage 6 of 10Next →

No leaderboard results yet.