Temporal Robustness against Data Poisoning Feb 7, 2023 Data Poisoning
— Unverified 0The Price of Tailoring the Index to Your Data: Poisoning Attacks on Learned Index Structures Aug 1, 2020 BIG-bench Machine Learning Data Poisoning
— Unverified 0The Stronger the Diffusion Model, the Easier the Backdoor: Data Poisoning to Induce Copyright Breaches Without Adjusting Finetuning Pipeline Jan 7, 2024 Backdoor Attack Data Poisoning
— Unverified 0Data Poisoning Attack against Knowledge Graph Embedding Apr 26, 2019 Data Poisoning Graph Embedding
— Unverified 0Towards Multi-Objective Statistically Fair Federated Learning Jan 24, 2022 Data Poisoning Fairness
— Unverified 0Towards Poisoning Fair Representations Sep 28, 2023 Bilevel Optimization Data Poisoning
— Unverified 0Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization Aug 29, 2017 Data Poisoning Deep Learning
— Unverified 0Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks Oct 13, 2021 Data Poisoning Malware Classification
— Unverified 0Trading Devil Final: Backdoor attack via Stock market and Bayesian Optimization Jul 21, 2024 Automatic Speech Recognition Backdoor Attack
— Unverified 0Trading Devil RL: Backdoor attack via Stock market, Bayesian Optimization and Reinforcement Learning Dec 23, 2024 Backdoor Attack Bayesian Optimization
— Unverified 0Training set cleansing of backdoor poisoning by self-supervised representation learning Oct 19, 2022 Data Poisoning image-classification
— Unverified 0Data Poisoning Attack Aiming the Vulnerability of Continual Learning Nov 29, 2022 Adversarial Attack Continual Learning
— Unverified 0Model-Agnostic Explanations using Minimal Forcing Subsets Nov 1, 2020 BIG-bench Machine Learning Counterfactual Explanation
— Unverified 0TrojanTime: Backdoor Attacks on Time Series Classification Feb 2, 2025 Classification Data Poisoning
— Unverified 0TrojFSP: Trojan Insertion in Few-shot Prompt Tuning Dec 16, 2023 Data Poisoning Language Modelling
— Unverified 0Try to Avoid Attacks: A Federated Data Sanitization Defense for Healthcare IoMT Systems Nov 3, 2022 Clustering Data Poisoning
— Unverified 0Tuning without Peeking: Provable Privacy and Generalization Bounds for LLM Post-Training Jul 2, 2025 Data Poisoning Generalization Bounds
— Unverified 0Turning Generative Models Degenerate: The Power of Data Poisoning Attacks Jul 17, 2024 Data Poisoning parameter-efficient fine-tuning
— Unverified 0Understanding Influence Functions and Datamodels via Harmonic Analysis Oct 3, 2022 Data Poisoning
— Unverified 0Unlearnable Examples Detection via Iterative Filtering Aug 15, 2024 Data Poisoning
— Unverified 0UTrace: Poisoning Forensics for Private Collaborative Learning Sep 23, 2024 Data Poisoning Privacy Preserving
— Unverified 0VPN: Verification of Poisoning in Neural Networks May 8, 2022 Data Poisoning image-classification
— Unverified 0What's Pulling the Strings? Evaluating Integrity and Attribution in AI Training and Inference through Concept Shift Apr 28, 2025 Attribute Data Poisoning
— Unverified 0What Distributions are Robust to Indiscriminate Poisoning Attacks for Linear Learners? Jul 3, 2023 Data Poisoning
— Unverified 0Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning May 4, 2022 BIG-bench Machine Learning Data Poisoning
— Unverified 0Winter Soldier: Backdooring Language Models at Pre-Training with Indirect Data Poisoning Jun 17, 2025 Data Poisoning Memorization
— Unverified 0Wolf in Sheep's Clothing - The Downscaling Attack Against Deep Learning Applications Dec 21, 2017 Data Poisoning Deep Learning
— Unverified 0You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion Jul 5, 2020 Code Completion Data Poisoning
— Unverified 0Histopathological Image Classification and Vulnerability Analysis using Federated Learning Oct 11, 2023 Classification Data Poisoning
— Unverified 0How Robust are Randomized Smoothing based Defenses to Data Poisoning? Dec 2, 2020 Adversarial Robustness Bilevel Optimization
— Unverified 0Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning Jan 14, 2020 Data Poisoning Information Retrieval
— Unverified 0WW-FL: Secure and Private Large-Scale Federated Learning Feb 20, 2023 Data Poisoning Federated Learning
— Unverified 0Hyperparameter Learning under Data Poisoning: Analysis of the Influence of Regularization via Multiobjective Bilevel Optimization Jun 2, 2023 Bilevel Optimization Data Poisoning
— Unverified 0If You Don't Understand It, Don't Use It: Eliminating Trojans with Filters Between Layers Jul 8, 2024 Data Poisoning
— Unverified 0Imperceptible Rhythm Backdoor Attacks: Exploring Rhythm Transformation for Embedding Undetectable Vulnerabilities on Speech Recognition Jun 16, 2024 Automatic Speech Recognition Data Poisoning
— Unverified 0Adversarial Backdoor Attack by Naturalistic Data Poisoning on Trajectory Prediction in Autonomous Driving Jun 27, 2023 Autonomous Driving Backdoor Attack
— Unverified 0Indiscriminate Data Poisoning Attacks on Pre-trained Feature Extractors Feb 20, 2024 Data Poisoning Domain Adaptation
— Unverified 0Influence Based Defense Against Data Poisoning Attacks in Online Learning Apr 24, 2021 Adversarial Attack Data Poisoning
— Unverified 0Influence Function based Data Poisoning Attacks to Top-N Recommender Systems Feb 19, 2020 Data Poisoning Recommendation Systems
— Unverified 0Instructions as Backdoors: Backdoor Vulnerabilities of Instruction Tuning for Large Language Models May 24, 2023 Continual Learning Data Poisoning
— Unverified 0Interactive System-wise Anomaly Detection Apr 21, 2023 Anomaly Detection Data Poisoning
— Unverified 0Inverting Gradient Attacks Makes Powerful Data Poisoning Oct 28, 2024 Data Poisoning
— Unverified 0Investigating cybersecurity incidents using large language models in latest-generation wireless networks Apr 14, 2025 Binary Classification Data Poisoning
— Unverified 0Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain Jul 9, 2022 Backdoor Attack Data Poisoning
— Unverified 0TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks Nov 2, 2018 Autonomous Driving Autonomous Vehicles
— Unverified 0Is feature selection secure against training data poisoning? Apr 21, 2018 Computational Efficiency Data Poisoning
— Unverified 0Just How Toxic is Data Poisoning? A Benchmark for Backdoor and Data Poisoning Attacks Jan 1, 2021 Data Poisoning Experimental Design
— Unverified 0Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System Aug 17, 2022 Activity Recognition Data Poisoning
— Unverified 0Label Sanitization against Label Flipping Poisoning Attacks Mar 2, 2018 Data Poisoning
— Unverified 0From Vulnerabilities to Remediation: A Systematic Literature Review of LLMs in Code Security Dec 19, 2024 Data Poisoning Systematic Literature Review
— Unverified 0