Login / Signup

Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?

Kaidi JinTianwei ZhangChao ShenYufei ChenMing FanChenhao LinTing Liu
Published in: IEEE Trans. Dependable Secur. Comput. (2023)
Keyphrases
  • machine learning methods
  • real time
  • information retrieval
  • clustering algorithm
  • decision trees
  • computational cost
  • object detection
  • empirical studies