ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1706.03691
  4. Cited By
Certified Defenses for Data Poisoning Attacks

Certified Defenses for Data Poisoning Attacks

9 June 2017
Jacob Steinhardt
Pang Wei Koh
Percy Liang
    AAML
ArXivPDFHTML

Papers citing "Certified Defenses for Data Poisoning Attacks"

36 / 36 papers shown
Title
Traceback of Poisoning Attacks to Retrieval-Augmented Generation
Traceback of Poisoning Attacks to Retrieval-Augmented Generation
Baolei Zhang
Haoran Xin
Minghong Fang
Zhuqing Liu
Biao Yi
Tong Li
Zheli Liu
SILM
AAML
102
0
0
30 Apr 2025
Atlas: A Framework for ML Lifecycle Provenance & Transparency
Atlas: A Framework for ML Lifecycle Provenance & Transparency
Marcin Spoczynski
Marcela S. Melara
Siyang Song
124
1
0
26 Feb 2025
Game-Theoretic Defenses for Robust Conformal Prediction Against Adversarial Attacks in Medical Imaging
Game-Theoretic Defenses for Robust Conformal Prediction Against Adversarial Attacks in Medical Imaging
Rui Luo
Jie Bao
Zhixin Zhou
Chuangyin Dang
MedIm
AAML
132
5
0
07 Nov 2024
Human-inspired Perspectives: A Survey on AI Long-term Memory
Human-inspired Perspectives: A Survey on AI Long-term Memory
Zihong He
Weizhe Lin
Hao Zheng
Fan Zhang
Matt Jones
Laurence Aitchison
X. Xu
Miao Liu
Per Ola Kristensson
Junxiao Shen
110
2
0
01 Nov 2024
Partner in Crime: Boosting Targeted Poisoning Attacks against Federated Learning
Partner in Crime: Boosting Targeted Poisoning Attacks against Federated Learning
Shihua Sun
Shridatt Sugrim
Angelos Stavrou
Haining Wang
AAML
88
1
0
13 Jul 2024
Machine Unlearning Fails to Remove Data Poisoning Attacks
Machine Unlearning Fails to Remove Data Poisoning Attacks
Martin Pawelczyk
Jimmy Z. Di
Yiwei Lu
Gautam Kamath
Ayush Sekhari
Seth Neel
AAML
MU
75
12
0
25 Jun 2024
Support Vector Machines under Adversarial Label Contamination
Support Vector Machines under Adversarial Label Contamination
Huang Xiao
Battista Biggio
B. Nelson
Han Xiao
Claudia Eckert
Fabio Roli
AAML
31
231
0
01 Jun 2022
Poisoning Behavioral Malware Clustering
Poisoning Behavioral Malware Clustering
Battista Biggio
Konrad Rieck
Andrea Valenza
Christian Wressnegger
Igino Corona
Giorgio Giacinto
Fabio Roli
23
152
0
25 Nov 2018
Is Data Clustering in Adversarial Settings Secure?
Is Data Clustering in Adversarial Settings Secure?
Battista Biggio
I. Pillai
Samuel Rota Buló
Andrea Valenza
Marcello Pelillo
Fabio Roli
AAML
25
129
0
25 Nov 2018
Is feature selection secure against training data poisoning?
Is feature selection secure against training data poisoning?
Huang Xiao
Battista Biggio
Gavin Brown
Giorgio Fumera
Claudia Eckert
Fabio Roli
AAML
SILM
39
423
0
21 Apr 2018
Security Evaluation of Pattern Classifiers under Attack
Security Evaluation of Pattern Classifiers under Attack
Battista Biggio
Giorgio Fumera
Fabio Roli
AAML
39
442
0
02 Sep 2017
Resilient Linear Classification: An Approach to Deal with Attacks on
  Training Data
Resilient Linear Classification: An Approach to Deal with Attacks on Training Data
Sangdon Park
James Weimer
Insup Lee
AAML
44
6
0
10 Aug 2017
Understanding Black-box Predictions via Influence Functions
Understanding Black-box Predictions via Influence Functions
Pang Wei Koh
Percy Liang
TDI
134
2,854
0
14 Mar 2017
Tactics of Adversarial Attack on Deep Reinforcement Learning Agents
Tactics of Adversarial Attack on Deep Reinforcement Learning Agents
Yen-Chen Lin
Zhang-Wei Hong
Yuan-Hong Liao
Meng-Li Shih
Ming-Yuan Liu
Min Sun
AAML
49
411
0
08 Mar 2017
Generative Poisoning Attack Method Against Neural Networks
Generative Poisoning Attack Method Against Neural Networks
Chaofei Yang
Qing Wu
Hai Helen Li
Yiran Chen
AAML
54
218
0
03 Mar 2017
Adversarial Attacks on Neural Network Policies
Adversarial Attacks on Neural Network Policies
Sandy Huang
Nicolas Papernot
Ian Goodfellow
Yan Duan
Pieter Abbeel
MLAU
AAML
62
832
0
08 Feb 2017
Vulnerability of Deep Reinforcement Learning to Policy Induction Attacks
Vulnerability of Deep Reinforcement Learning to Policy Induction Attacks
Vahid Behzadan
Arslan Munir
AAML
SILM
45
275
0
16 Jan 2017
Towards the Science of Security and Privacy in Machine Learning
Towards the Science of Security and Privacy in Machine Learning
Nicolas Papernot
Patrick McDaniel
Arunesh Sinha
Michael P. Wellman
AAML
54
472
0
11 Nov 2016
Learning from Untrusted Data
Learning from Untrusted Data
Moses Charikar
Jacob Steinhardt
Gregory Valiant
FedML
OOD
67
293
0
07 Nov 2016
Stealing Machine Learning Models via Prediction APIs
Stealing Machine Learning Models via Prediction APIs
Florian Tramèr
Fan Zhang
Ari Juels
Michael K. Reiter
Thomas Ristenpart
SILM
MLAU
68
1,798
0
09 Sep 2016
Data Poisoning Attacks on Factorization-Based Collaborative Filtering
Data Poisoning Attacks on Factorization-Based Collaborative Filtering
Bo Li
Yining Wang
Aarti Singh
Yevgeniy Vorobeychik
AAML
53
341
0
29 Aug 2016
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
489
5,868
0
08 Jul 2016
Avoiding Imposters and Delinquents: Adversarial Crowdsourcing and Peer
  Prediction
Avoiding Imposters and Delinquents: Adversarial Crowdsourcing and Peer Prediction
Jacob Steinhardt
Gregory Valiant
Moses Charikar
33
44
0
16 Jun 2016
Curie: A method for protecting SVM Classifier from Poisoning Attack
Curie: A method for protecting SVM Classifier from Poisoning Attack
Ricky Laishram
V. Phoha
AAML
8
49
0
05 Jun 2016
Transferability in Machine Learning: from Phenomena to Black-Box Attacks
  using Adversarial Samples
Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples
Nicolas Papernot
Patrick McDaniel
Ian Goodfellow
SILM
AAML
78
1,735
0
24 May 2016
Agnostic Estimation of Mean and Covariance
Agnostic Estimation of Mean and Covariance
Kevin A. Lai
Anup B. Rao
Santosh Vempala
52
344
0
24 Apr 2016
Robust Estimators in High Dimensions without the Computational
  Intractability
Robust Estimators in High Dimensions without the Computational Intractability
Ilias Diakonikolas
Gautam Kamath
D. Kane
Jingkai Li
Ankur Moitra
Alistair Stewart
61
510
0
21 Apr 2016
The Teaching Dimension of Linear Learners
The Teaching Dimension of Linear Learners
Ji Liu
Xiaojin Zhu
32
65
0
07 Dec 2015
Robust Regression via Hard Thresholding
Robust Regression via Hard Thresholding
Kush S. Bhatia
Prateek Jain
Purushottam Kar
AAML
OOD
40
156
0
08 Jun 2015
Explaining and Harnessing Adversarial Examples
Explaining and Harnessing Adversarial Examples
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAML
GAN
158
18,922
0
20 Dec 2014
The Statistics of Streaming Sparse Regression
The Statistics of Streaming Sparse Regression
Jacob Steinhardt
Stefan Wager
Percy Liang
143
10
0
13 Dec 2014
Intriguing properties of neural networks
Intriguing properties of neural networks
Christian Szegedy
Wojciech Zaremba
Ilya Sutskever
Joan Bruna
D. Erhan
Ian Goodfellow
Rob Fergus
AAML
159
14,831
1
21 Dec 2013
Robust High Dimensional Sparse Regression and Matching Pursuit
Robust High Dimensional Sparse Regression and Matching Pursuit
Yudong Chen
Constantine Caramanis
Shie Mannor
58
20
0
12 Jan 2013
Poisoning Attacks against Support Vector Machines
Poisoning Attacks against Support Vector Machines
Battista Biggio
B. Nelson
Pavel Laskov
AAML
80
1,580
0
27 Jun 2012
Robust Lasso with missing and grossly corrupted observations
Robust Lasso with missing and grossly corrupted observations
Nam H. Nguyen
T. Tran
89
156
0
02 Dec 2011
Exact recoverability from dense corrupted observations via $L_1$
  minimization
Exact recoverability from dense corrupted observations via L1L_1L1​ minimization
Nam H. Nguyen
T. Tran
69
117
0
07 Feb 2011
1