Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security 2021
DOI: 10.1145/3460120.3485368
|View full text |Cite
|
Sign up to set email alerts
|

Subpopulation Data Poisoning Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 41 publications
(29 citation statements)
references
References 42 publications
0
17
0
Order By: Relevance
“…For the subpopulation attack experiments, we use the Adult dataset [3]. This dataset was used for evaluation by the first subpopulation attack paper [7] and we directly use Jagielski et al's preprocessed version of the dataset. We conduct experiments on linear SVM model and compare our model-targeted poisoning attack in Algorithm 1 to the state-of-the-art KKT attack [9].…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…For the subpopulation attack experiments, we use the Adult dataset [3]. This dataset was used for evaluation by the first subpopulation attack paper [7] and we directly use Jagielski et al's preprocessed version of the dataset. We conduct experiments on linear SVM model and compare our model-targeted poisoning attack in Algorithm 1 to the state-of-the-art KKT attack [9].…”
Section: Methodsmentioning
confidence: 99%
“…Subpopulations. We identify the subpopulations for the Adult dataset using k-means clustering techniques (ClusterMatch [7]) to obtain different clusters (k = 20 in our case). For each cluster, we select instances with label "<=50K" to form the subpopulation (indicating all instances in the subpopulation are in low income group).…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…To increase stealthiness, some techniques exploit properties of image classification: TaCT [64] uses triggers that only work for a given class and WaNet [50] uses image warping as a trigger such that the trigger is imperceptible to humans. A recent subpopulation attack [35] does not use triggers, but instead supplies poisoned data targeting a specific "subpopulation" within the dataset. After training, the poisoned classifier will exclusively misclassify the target subpopulation.…”
Section: Attacker Controlled Trainingmentioning
confidence: 99%