A digital artwork showing a human brain split into two halves, one organic and one circuit-board-like, symbolizing the fusion of biology and technology.

A Taxonomy Of AI Data Poisoning Defenses

We begin our taxonomy by dividing data poisoning defenses into three broad categories: Attack Identification Techniques, Attack Repair Techniques, and Attack Prevention Techniques, in which are then organized key research papers by defense type.

Data Poisoning Attack Identification Techniques

In this section, data poisoning defenses are divided into Techniques For Identifying Poisoned Data and Techniques For Identifying Poisoned Models.

Techniques For Identifying Poisoned Data

Techniques For Identifying Poisoned Models

Data Poisoning Attack Repair Techniques

In this section, data poisoning defenses are divided into Techniques For Patching Known Triggers and Techniques For Trigger-Agnostic Backdoor Removal.

Techniques For Patching Known Triggers

Techniques For Trigger-Agnostic Backdoor Removal

Data Poisoning Attack Prevention Techniques

In this section, data poisoning defenses are divided into Randomized Smoothing Techniques For Poisoning Attack Prevention, Differential Privacy Techniques For Poisoning Attack Prevention, and Input Processing Techniques For Poisoning Attack Prevention.

Randomized Smoothing Techniques For Poisoning Attack Prevention

Differential Privacy Techniques For Poisoning Attack Prevention

Input Processing Techniques For Poisoning Attack Prevention

Thanks for reading!