• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?

Kaidi JinTianwei ZhangChao ShenYufei ChenMing FanChenhao LinTing Liu
Published in: IEEE Trans. Dependable Secur. Comput. (2023)
Keyphrases
  • machine learning methods
  • real time
  • information retrieval
  • clustering algorithm
  • decision trees
  • computational cost
  • object detection
  • empirical studies