A survey on federated learning systems: Vision, hype and reality for data privacy and protection

Q Li, Z Wen, Z Wu, S Hu, N Wang, Y Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
As data privacy increasingly becomes a critical societal concern, federated learning has
been a hot research topic in enabling the collaborative training of machine learning models …

Secure and robust machine learning for healthcare: A survey

A Qayyum, J Qadir, M Bilal… - IEEE Reviews in …, 2020 - ieeexplore.ieee.org
Recent years have witnessed widespread adoption of machine learning (ML)/deep learning
(DL) techniques due to their superior performance for a variety of healthcare applications …

Attack of the tails: Yes, you really can backdoor federated learning

H Wang, K Sreenivasan, S Rajput… - Advances in …, 2020 - proceedings.neurips.cc
Due to its decentralized nature, Federated Learning (FL) lends itself to adversarial attacks in
the form of backdoors during training. The goal of a backdoor is to corrupt the performance …

Machine learning testing: Survey, landscapes and horizons

JM Zhang, M Harman, L Ma… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This paper provides a comprehensive survey of techniques for testing machine learning
systems; Machine Learning Testing (ML testing) research. It covers 144 papers on testing …

Adversarial examples: Attacks and defenses for deep learning

X Yuan, P He, Q Zhu, X Li - IEEE transactions on neural …, 2019 - ieeexplore.ieee.org
With rapid progress and significant successes in a wide spectrum of applications, deep
learning is being applied in many safety-critical environments. However, deep neural …

Targeted backdoor attacks on deep learning systems using data poisoning

X Chen, C Liu, B Li, K Lu, D Song - arxiv preprint arxiv:1712.05526, 2017 - arxiv.org
Deep learning models have achieved high performance on many tasks, and thus have been
applied to many security-critical scenarios. For example, deep learning-based face …

Blind backdoors in deep learning models

E Bagdasaryan, V Shmatikov - 30th USENIX Security Symposium …, 2021 - usenix.org
We investigate a new method for injecting backdoors into machine learning models, based
on compromising the loss-value computation in the model-training code. We use it to …

Manipulating machine learning: Poisoning attacks and countermeasures for regression learning

M Jagielski, A Oprea, B Biggio, C Liu… - … IEEE symposium on …, 2018 - ieeexplore.ieee.org
As machine learning becomes widely used for automated decisions, attackers have strong
incentives to manipulate the results and models generated by machine learning algorithms …

[HTML][HTML] A survey on security in internet of things with a focus on the impact of emerging technologies

P Williams, IK Dutta, H Daoud, M Bayoumi - Internet of Things, 2022 - Elsevier
Abstract Internet of Things (IoT) have opened the door to a world of unlimited possibilities for
implementations in varied sectors in society, but it also has many challenges. One of those …

Backdoor attacks and countermeasures on deep learning: A comprehensive review

Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu… - arxiv preprint arxiv …, 2020 - arxiv.org
This work provides the community with a timely comprehensive review of backdoor attacks
and countermeasures on deep learning. According to the attacker's capability and affected …