Label-flipping is popular because of key advantages such as requiring not only minimal access to data, but minimal computational resources, as well. In addition to this attack’s low effort and low cost…
Author: Brian Colwell
A Taxonomy Of Backdoor AI Data Poisoning Attacks
In this section, backdoor data poisoning attacks are divided into the following categories: Backdooring Pretrained Models Attacks that insert hidden malicious behaviors into models during the pretraining phase, before they are fine-tuned…
A Taxonomy Of AI Training Data Poisoning Attacks
In this brief taxonomy, training data poisoning attacks are divided into the following categories: Bilevel Optimization Poisoning Attacks These attacks frame the poisoning problem as a bilevel optimization where the attacker solves…
A Taxonomy Of AI Data Poisoning Defenses
We begin our taxonomy by dividing data poisoning defenses into three broad categories: Attack Identification Techniques, Attack Repair Techniques, and Attack Prevention Techniques, in which are then organized key research papers by defense type….
The Big List Of AI Data Poisoning Attack And Defense References And Resources
Note that the below are in alphabetical order by title. Enjoy! Thanks for reading!
What Are AI Sensitive Information Disclosure Attacks? The Threat Landscape
The Open Worldwide Application Security Project (OWASP), a nonprofit organization focused on LLM security risk education, updated for 2025 its well-respected list ‘Top 10 for Large Language Model Applications’. Amongst OWASP’s top AI security…
Popular AI Model Inversion Attack Strategies
In general, it can be said that the success of model inversion attacks relies on a key observation: machine learning models encode statistical patterns from their training data that can be exploited…
A Brief Taxonomy Of AI Model Inversion Attacks
To execute model inversion attacks, attackers typically need a combination of capabilities and resources that vary significantly depending on the sophistication of the attack and the defenses in place. Query access to…
A Brief Introduction To AI Model Inversion Attacks
Model inversion attacks represent a significant, but manageable, privacy threat in the AI security landscape. These attacks exploit the intrinsic relationship between a trained model and its training data to reconstruct private…
The Big List Of AI Model Inversion Attack And Defense References And Resources
Note that the below are in alphabetical order. Enjoy! Thanks for reading!