共 43 条
[21]
Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly
[J].
IEEE ACCESS,
2019, 7
:158126-158147
[22]
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks
[J].
RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018,
2018, 11050
:273-294
[24]
Trojaning Attack on Neural Networks
[J].
25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018),
2018,
[25]
Lyu X., 2023, P 37 AAAI C ART INT
[26]
McMahan H. B., 2016, arXiv
[27]
McMahan HB, 2017, PR MACH LEARN RES, V54, P1273
[29]
Data Poisoning in Sequential and Parallel Federated Learning*
[J].
PROCEEDINGS OF THE 2022 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA '22),
2022,
:24-34
[30]
Pillutla K, 2022, Arxiv, DOI arXiv:1912.13445