Backdoor Attacks against Deep Neural Networks by Personalized Audio Steganography.
Peng LiuShuyi ZhangChuanjian YaoWenzhe YeXianxian LiPublished in: ICPR (2022)
Keyphrases
- neural network
- multimedia
- pattern recognition
- countermeasures
- artificial neural networks
- spread spectrum
- signal processing
- watermarking algorithm
- genetic algorithm
- audio stream
- information hiding
- neural nets
- e learning
- multi layer
- neural network model
- image watermarking
- visual information
- fuzzy logic
- context aware
- watermarking method
- hidden information
- recommender systems
- jpeg images
- security mechanisms
- back propagation
- visual data
- self organizing maps
- user model
- information security