Academic literature on the topic 'Data poisoning attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data poisoning attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data poisoning attacks"
Billah, Mustain, Adnan Anwar, Ziaur Rahman, and Syed Md Galib. "Bi-Level Poisoning Attack Model and Countermeasure for Appliance Consumption Data of Smart Homes." Energies 14, no. 13 (June 28, 2021): 3887. http://dx.doi.org/10.3390/en14133887.
Full textChen, Jian, Xuxin Zhang, Rui Zhang, Chen Wang, and Ling Liu. "De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks." IEEE Transactions on Information Forensics and Security 16 (2021): 3412–25. http://dx.doi.org/10.1109/tifs.2021.3080522.
Full textSaha, Aniruddha, Akshayvarun Subramanya, and Hamed Pirsiavash. "Hidden Trigger Backdoor Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (April 3, 2020): 11957–65. http://dx.doi.org/10.1609/aaai.v34i07.6871.
Full textDunn, Corey, Nour Moustafa, and Benjamin Turnbull. "Robustness Evaluations of Sustainable Machine Learning Models against Data Poisoning Attacks in the Internet of Things." Sustainability 12, no. 16 (August 10, 2020): 6434. http://dx.doi.org/10.3390/su12166434.
Full textWeerasinghe, Sandamal, Tansu Alpcan, Sarah M. Erfani, and Christopher Leckie. "Defending Support Vector Machines Against Data Poisoning Attacks." IEEE Transactions on Information Forensics and Security 16 (2021): 2566–78. http://dx.doi.org/10.1109/tifs.2021.3058771.
Full textKalajdzic, Kenan, Ahmed Patel, and Mona Taghavi. "Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs." International Journal of Digital Crime and Forensics 3, no. 3 (July 2011): 50–60. http://dx.doi.org/10.4018/jdcf.2011070104.
Full textAlsuwat, Emad, Hatim Alsuwat, Marco Valtorta, and Csilla Farkas. "Adversarial data poisoning attacks against the PC learning algorithm." International Journal of General Systems 49, no. 1 (June 17, 2019): 3–31. http://dx.doi.org/10.1080/03081079.2019.1630401.
Full textPrabadevi, B., and N. Jeyanthi. "TSCBA-A Mitigation System for ARP Cache Poisoning Attacks." Cybernetics and Information Technologies 18, no. 4 (November 1, 2018): 75–93. http://dx.doi.org/10.2478/cait-2018-0049.
Full textZhou, Xingchen, Ming Xu, Yiming Wu, and Ning Zheng. "Deep Model Poisoning Attack on Federated Learning." Future Internet 13, no. 3 (March 14, 2021): 73. http://dx.doi.org/10.3390/fi13030073.
Full textAydin, Burc. "Global Characteristics of Chemical, Biological, and Radiological Poison Use in Terrorist Attacks." Prehospital and Disaster Medicine 35, no. 3 (April 2, 2020): 260–66. http://dx.doi.org/10.1017/s1049023x20000394.
Full textDissertations / Theses on the topic "Data poisoning attacks"
"Data Poisoning Attacks on Linked Data with Graph Regularization." Master's thesis, 2019. http://hdl.handle.net/2286/R.I.53572.
Full textDissertation/Thesis
Masters Thesis Computer Science 2019
Book chapters on the topic "Data poisoning attacks"
Chen, Pengpeng, Hailong Sun, and Zhijun Chen. "Data Poisoning Attacks on Crowdsourcing Learning." In Web and Big Data, 164–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-85896-4_14.
Full textMa, Yuzhe, Kwang-Sung Jun, Lihong Li, and Xiaojin Zhu. "Data Poisoning Attacks in Contextual Bandits." In Lecture Notes in Computer Science, 186–204. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01554-1_11.
Full textTolpegin, Vale, Stacey Truex, Mehmet Emre Gursoy, and Ling Liu. "Data Poisoning Attacks Against Federated Learning Systems." In Computer Security – ESORICS 2020, 480–501. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58951-6_24.
Full textTahmasebian, Farnaz, Li Xiong, Mani Sotoodeh, and Vaidy Sunderam. "Crowdsourcing Under Data Poisoning Attacks: A Comparative Study." In Data and Applications Security and Privacy XXXIV, 310–32. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49669-2_18.
Full textZhou, Qi, Yizhi Ren, Tianyu Xia, Lifeng Yuan, and Linqiang Chen. "Data Poisoning Attacks on Graph Convolutional Matrix Completion." In Algorithms and Architectures for Parallel Processing, 427–39. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38961-1_38.
Full textLin, Chia-Chih, and Ming-Syan Chen. "Attack Is the Best Defense: A Multi-Mode Poisoning PUF Against Machine Learning Attacks." In Advances in Knowledge Discovery and Data Mining, 176–87. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75762-5_15.
Full textPeri, Neehar, Neal Gupta, W. Ronny Huang, Liam Fowl, Chen Zhu, Soheil Feizi, Tom Goldstein, and John P. Dickerson. "Deep k-NN Defense Against Clean-Label Data Poisoning Attacks." In Computer Vision – ECCV 2020 Workshops, 55–70. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66415-2_4.
Full textLi, Xi, David J. Miller, Zhen Xiang, and George Kesidis. "A Scalable Mixture Model Based Defense Against Data Poisoning Attacks on Classifiers." In Lecture Notes in Computer Science, 262–73. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61725-7_31.
Full textUsman, Muhammad, Divya Gopinath, Youcheng Sun, Yannic Noller, and Corina S. Păsăreanu. "NNrepair: Constraint-Based Repair of Neural Network Classifiers." In Computer Aided Verification, 3–25. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81685-8_1.
Full textGupta, Viresh, and Tanmoy Chakraborty. "VIKING: Adversarial Attack on Network Embeddings via Supervised Network Poisoning." In Advances in Knowledge Discovery and Data Mining, 103–15. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75768-7_9.
Full textConference papers on the topic "Data poisoning attacks"
Ma, Yuzhe, Xiaojin Zhu, and Justin Hsu. "Data Poisoning against Differentially-Private Learners: Attacks and Defenses." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/657.
Full textLiu, Heng, and Gregory Ditzler. "Data Poisoning Attacks against MRMR." In ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2019. http://dx.doi.org/10.1109/icassp.2019.8683530.
Full textNuding, Florian, and Rudolf Mayer. "Poisoning Attacks in Federated Learning." In CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3374664.3379534.
Full textZhang, Hengtong, Tianhang Zheng, Jing Gao, Chenglin Miao, Lu Su, Yaliang Li, and Kui Ren. "Data Poisoning Attack against Knowledge Graph Embedding." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/674.
Full textChen, Huiyuan, and Jing Li. "Data Poisoning Attacks on Cross-domain Recommendation." In CIKM '19: The 28th ACM International Conference on Information and Knowledge Management. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3357384.3358116.
Full textWallace, Eric, Tony Zhao, Shi Feng, and Sameer Singh. "Concealed Data Poisoning Attacks on NLP Models." In Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Stroudsburg, PA, USA: Association for Computational Linguistics, 2021. http://dx.doi.org/10.18653/v1/2021.naacl-main.13.
Full textRusso, Alessio, and Alexandre Proutiere. "Poisoning Attacks against Data-Driven Control Methods." In 2021 American Control Conference (ACC). IEEE, 2021. http://dx.doi.org/10.23919/acc50511.2021.9482992.
Full textWu, Jun, and Jingrui He. "Indirect Invisible Poisoning Attacks on Domain Adaptation." In KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3447548.3467214.
Full textTakahashi, Tsubasa. "Indirect Adversarial Attacks via Poisoning Neighbors for Graph Convolutional Networks." In 2019 IEEE International Conference on Big Data (Big Data). IEEE, 2019. http://dx.doi.org/10.1109/bigdata47090.2019.9006004.
Full textOu, Yifan, and Reza Samavi. "Mixed Strategy Game Model Against Data Poisoning Attacks." In 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE, 2019. http://dx.doi.org/10.1109/dsn-w.2019.00015.
Full text