A comprehensive survey on poisoning attacks and countermeasures in machine learning

Z Tian, L Cui, J Liang, S Yu - ACM Computing Surveys, 2022 - dl.acm.org
The prosperity of machine learning has been accompanied by increasing attacks on the
training process. Among them, poisoning attacks have become an emerging threat during …

Wild patterns reloaded: A survey of machine learning security against training data poisoning

AE Cinà, K Grosse, A Demontis, S Vascon… - ACM Computing …, 2023 - dl.acm.org
The success of machine learning is fueled by the increasing availability of computing power
and large training datasets. The training data is used to learn new models or update existing …

Trustworthy LLMs: A survey and guideline for evaluating large language models' alignment

Y Liu, Y Yao, JF Ton, X Zhang, RGH Cheng… - arXiv preprint arXiv …, 2023 - arxiv.org
Ensuring alignment, which refers to making models behave in accordance with human
intentions [1, 2], has become a critical task before deploying large language models (LLMs) …

Local model poisoning attacks to {Byzantine-Robust} federated learning

M Fang, X Cao, J Jia, N Gong - 29th USENIX security symposium …, 2020 - usenix.org
In federated learning, multiple client devices jointly learn a machine learning model: each
client device maintains a local model for its local training dataset, while a master device …

Targeted backdoor attacks on deep learning systems using data poisoning

X Chen, C Liu, B Li, K Lu, D Song - arXiv preprint arXiv:1712.05526, 2017 - arxiv.org
Deep learning models have achieved high performance on many tasks, and thus have been
applied to many security-critical scenarios. For example, deep learning-based face …

Manipulating machine learning: Poisoning attacks and countermeasures for regression learning

M Jagielski, A Oprea, B Biggio, C Liu… - … IEEE symposium on …, 2018 - ieeexplore.ieee.org
As machine learning becomes widely used for automated decisions, attackers have strong
incentives to manipulate the results and models generated by machine learning algorithms …

Machine learning in cybersecurity: a comprehensive survey

D Dasgupta, Z Akhtar, S Sen - The Journal of Defense …, 2022 - journals.sagepub.com
Today's world is highly network interconnected owing to the pervasiveness of small personal
devices (eg, smartphones) as well as large computing devices or services (eg, cloud …

Performance evaluation of machine learning methods for credit card fraud detection using SMOTE and AdaBoost

E Ileberi, Y Sun, Z Wang - IEEE Access, 2021 - ieeexplore.ieee.org
The advance in technologies such as e-commerce and financial technology (FinTech)
applications have sparked an increase in the number of online card transactions that occur …

Distributionally robust logistic regression

S Shafieezadeh Abadeh… - Advances in neural …, 2015 - proceedings.neurips.cc
This paper proposes a distributionally robust approach to logistic regression. We use the
Wasserstein distance to construct a ball in the space of probability distributions centered at …

Activeclean: Interactive data cleaning for statistical modeling

S Krishnan, J Wang, E Wu, MJ Franklin… - Proceedings of the …, 2016 - dl.acm.org
Analysts often clean dirty data iteratively--cleaning some data, executing the analysis, and
then cleaning more data based on the results. We explore the iterative cleaning process in …