C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?
Kaidi Jin
Tianwei Zhang
Chao Shen
Yufei Chen
Ming Fan
Chenhao Lin
Ting Liu
Published in:
IEEE Trans. Dependable Secur. Comput. (2023)
Keyphrases
</>
machine learning methods
real time
information retrieval
clustering algorithm
decision trees
computational cost
object detection
empirical studies