Detecting Adversarial Data via Perturbation Forgery.
Qian WangChen LiYuchen LuoHefei LingPing LiJiazhong ChenShijuan HuangNing YuPublished in: CoRR (2024)
Keyphrases
- data collection
- data analysis
- data processing
- raw data
- original data
- synthetic data
- data sets
- statistical analysis
- data mining techniques
- historical data
- database
- data sources
- image data
- computer systems
- knowledge discovery
- application domains
- data quality
- databases
- semi supervised
- labeled data
- data distribution
- multimedia data
- training set
- similarity measure
- noisy data
- complex data