Login / Signup

Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization.

Shaofeng LiMinhui XueBenjamin Zi Hao ZhaoHaojin ZhuXinpeng Zhang
Published in: IEEE Trans. Dependable Secur. Comput. (2021)
Keyphrases