# deduplication
3 articlestagged with “deduplication”
Data Deduplication Attacks
Exploiting and evading data deduplication processes used in training pipeline data cleaning to ensure poisoned samples survive preprocessing.
data-trainingdeduplicationpoisoningevasion
Security Implications of Training Data Deduplication
Analysis of how deduplication algorithms create security vulnerabilities, including adversarial deduplication evasion, strategic duplicate injection, and hash collision attacks.
training-pipelinededuplicationdata-securitypreprocessing
Finding Deduplication and Triage
Deduplicate and triage findings from automated and manual testing into actionable, prioritized vulnerability reports.
walkthroughsmethodologydeduplicationtriage