Login / Signup
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?
Kaidi Jin
Tianwei Zhang
Chao Shen
Yufei Chen
Ming Fan
Chenhao Lin
Ting Liu
Published in:
IEEE Trans. Dependable Secur. Comput. (2023)
Keyphrases
</>
machine learning methods
real time
information retrieval
clustering algorithm
decision trees
computational cost
object detection
empirical studies