ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2202.10276
  4. Cited By
Poisoning Attacks and Defenses on Artificial Intelligence: A Survey

Poisoning Attacks and Defenses on Artificial Intelligence: A Survey

21 February 2022
M. A. Ramírez
Song-Kyoo Kim
H. A. Hamadi
Ernesto Damiani
Young-Ji Byon
Tae-Yeon Kim
C. Cho
C. Yeun
    AAML
ArXivPDFHTML

Papers citing "Poisoning Attacks and Defenses on Artificial Intelligence: A Survey"

15 / 15 papers shown
Title
GreenFactory: Ensembling Zero-Cost Proxies to Estimate Performance of Neural Networks
GreenFactory: Ensembling Zero-Cost Proxies to Estimate Performance of Neural Networks
Gabriel Cortes
Nuno Lourenço
Paolo Romano
Penousal Machado
UQCV
FedML
32
0
0
14 May 2025
$\textit{Agents Under Siege}$: Breaking Pragmatic Multi-Agent LLM Systems with Optimized Prompt Attacks
Agents Under Siege\textit{Agents Under Siege}Agents Under Siege: Breaking Pragmatic Multi-Agent LLM Systems with Optimized Prompt Attacks
Rana Muhammad Shahroz Khan
Zhen Tan
Sukwon Yun
Charles Flemming
Tianlong Chen
AAML
LLMAG
Presented at ResearchTrend Connect | LLMAG on 23 Apr 2025
96
3
0
31 Mar 2025
Data Poisoning in Deep Learning: A Survey
Data Poisoning in Deep Learning: A Survey
Pinlong Zhao
Weiyao Zhu
Pengfei Jiao
Di Gao
Ou Wu
AAML
39
0
0
27 Mar 2025
GreenMachine: Automatic Design of Zero-Cost Proxies for Energy-Efficient
  NAS
GreenMachine: Automatic Design of Zero-Cost Proxies for Energy-Efficient NAS
Gabriel Cortes
Nuno Lourenço
Penousal Machado
66
1
0
22 Nov 2024
Poser: Unmasking Alignment Faking LLMs by Manipulating Their Internals
Poser: Unmasking Alignment Faking LLMs by Manipulating Their Internals
Joshua Clymer
Caden Juang
Severin Field
CVBM
32
1
0
08 May 2024
A Comprehensive Survey of Attack Techniques, Implementation, and
  Mitigation Strategies in Large Language Models
A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models
Aysan Esmradi
Daniel Wankit Yip
C. Chan
AAML
32
11
0
18 Dec 2023
A Red Teaming Framework for Securing AI in Maritime Autonomous Systems
A Red Teaming Framework for Securing AI in Maritime Autonomous Systems
Mathew J. Walter
Aaron Barrett
Kimberly Tam
22
5
0
08 Dec 2023
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Guangjing Wang
Ce Zhou
Yuanda Wang
Bocheng Chen
Hanqing Guo
Qiben Yan
AAML
SILM
60
3
0
20 Nov 2023
Hiding Backdoors within Event Sequence Data via Poisoning Attacks
Hiding Backdoors within Event Sequence Data via Poisoning Attacks
Elizaveta Kovtun
A. Ermilova
Dmitry Berestnev
Alexey Zaytsev
SILM
AAML
22
1
0
20 Aug 2023
Unlearnable Examples Give a False Sense of Security: Piercing through
  Unexploitable Data with Learnable Examples
Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples
Wanzhu Jiang
Yunfeng Diao
He-Nan Wang
Jianxin Sun
M. Wang
Richang Hong
37
18
0
16 May 2023
Mole Recruitment: Poisoning of Image Classifiers via Selective Batch
  Sampling
Mole Recruitment: Poisoning of Image Classifiers via Selective Batch Sampling
Ethan Wisdom
Tejas Gokhale
Chaowei Xiao
Yezhou Yang
18
0
0
30 Mar 2023
New data poison attacks on machine learning classifiers for mobile
  exfiltration
New data poison attacks on machine learning classifiers for mobile exfiltration
M. A. Ramírez
Sangyoung Yoon
Ernesto Damiani
H. A. Hamadi
C. Ardagna
Nicola Bena
Young-Ji Byon
Tae-Yeon Kim
C. Cho
C. Yeun
AAML
17
4
0
20 Oct 2022
Survey: Leakage and Privacy at Inference Time
Survey: Leakage and Privacy at Inference Time
Marija Jegorova
Chaitanya Kaul
Charlie Mayor
Alison Q. OÑeil
Alexander Weir
Roderick Murray-Smith
Sotirios A. Tsaftaris
PILM
MIACV
17
71
0
04 Jul 2021
DeepPoison: Feature Transfer Based Stealthy Poisoning Attack
DeepPoison: Feature Transfer Based Stealthy Poisoning Attack
Jinyin Chen
Longyuan Zhang
Haibin Zheng
Xueke Wang
Zhaoyan Ming
AAML
27
19
0
06 Jan 2021
Analyzing Federated Learning through an Adversarial Lens
Analyzing Federated Learning through an Adversarial Lens
A. Bhagoji
Supriyo Chakraborty
Prateek Mittal
S. Calo
FedML
179
1,032
0
29 Nov 2018
1