SOTAVerified

Data Poisoning

Data Poisoning is an adversarial attack that tries to manipulate the training dataset in order to control the prediction behavior of a trained model such that the model will label malicious examples into a desired classes (e.g., labeling spam e-mails as safe).

Source: Explaining Vulnerabilities to Adversarial Machine Learning through Visual Analytics

Papers

Showing 301350 of 492 papers

TitleStatusHype
Rethinking Backdoor Data Poisoning Attacks in the Context of Semi-Supervised Learning0
Data Poisoning Attack Aiming the Vulnerability of Continual Learning0
Backdoor Vulnerabilities in Normally Trained Deep Learning Models0
Adversarial Attacks are a Surprisingly Strong Baseline for Poisoning Few-Shot Meta-Learners0
Analysis and Detectability of Offline Data Poisoning Attacks on Linear Dynamical SystemsCode0
FLock: Defending Malicious Behaviors in Federated Learning with Blockchain0
Try to Avoid Attacks: A Federated Data Sanitization Defense for Healthcare IoMT Systems0
FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-based Node Classification0
Analyzing the Robustness of Decentralized Horizontal and Vertical Federated Learning Architectures in a Non-IID Scenario0
Training set cleansing of backdoor poisoning by self-supervised representation learning0
Detecting Backdoors in Deep Text Classifiers0
On Optimal Learning Under Targeted Data Poisoning0
Understanding Influence Functions and Datamodels via Harmonic Analysis0
On the Robustness of Random Forest Against Untargeted Data Poisoning: An Ensemble-Based ApproachCode0
Defend Data Poisoning Attacks on Voice Authentication0
FedPrompt: Communication-Efficient and Privacy Preserving Prompt Tuning in Federated Learning0
Do-AIQ: A Design-of-Experiment Approach to Quality Evaluation of AI Mislabel Detection Algorithm0
Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System0
Neural network fragile watermarking with no model performance degradation0
Lethal Dose Conjecture on Data PoisoningCode0
Testing the Robustness of Learned Index StructuresCode0
Using Anomaly Detection to Detect Poisoning Attacks in Federated Learning Applications0
Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain0
Backdoor Attack is a Devil in Federated GAN-based Medical Image SynthesisCode0
Efficient Reward Poisoning Attacks on Online Deep Reinforcement LearningCode0
BagFlip: A Certified Defense against Data PoisoningCode0
SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning0
PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in Contrastive Learning0
Federated Multi-Armed Bandits Under Byzantine Attacks0
VPN: Verification of Poisoning in Neural Networks0
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning0
GFCL: A GRU-based Federated Continual Learning Framework against Data Poisoning Attacks in IoV0
Federated Learning: Balancing the Thin Line Between Data Intelligence and Privacy0
Indiscriminate Data Poisoning Attacks on Neural NetworksCode0
Breaking Fair Binary Classification with Optimal Flipping Attacks0
Machine Learning Security against Data Poisoning: Are We There Yet?Code0
Robustly-reliable learners under poisoning attacks0
Targeted Data Poisoning Attack on News Recommendation System by Content Perturbation0
Poisoning Attacks and Defenses on Artificial Intelligence: A Survey0
Degree-Preserving Randomized Response for Graph Neural Networks under Local Differential Privacy0
Collaborative Self Organizing Map with DeepNNs for Fake Task Prevention in Mobile Crowdsensing0
An Equivalence Between Data Poisoning and Byzantine Gradient AttacksCode0
Redactor: A Data-centric and Individualized Defense Against Inference Attacks0
Improved Certified Defenses against Data Poisoning with (Deterministic) Finite AggregationCode0
Towards Multi-Objective Statistically Fair Federated Learning0
How to Backdoor HyperNetwork in Personalized Federated Learning?0
Towards Understanding Quality Challenges of the Federated Learning for Neural Networks: A First Look from the Lens of RobustnessCode0
Compression-Resistant Backdoor Attack against Deep Neural Networks0
Execute Order 66: Targeted Data Poisoning for Reinforcement Learning0
ML Attack Models: Adversarial Attacks and Data Poisoning Attacks0
Show:102550
← PrevPage 7 of 10Next →

No leaderboard results yet.