Login / Signup
Backdoor Attacks on Crowd Counting.
Yuhua Sun
Tailai Zhang
Xingjun Ma
Pan Zhou
Jian Lou
Zichuan Xu
Xing Di
Yu Cheng
Lichao Sun
Published in:
ACM Multimedia (2022)
Keyphrases
</>
countermeasures
malicious users
database
watermarking scheme
security protocols
crowd sourced
data sets
information security
computer security
security threats
data publishing
security risks
crowd sourcing
attack scenarios
crowd simulation