Login / Signup
Backdoor Attacks on Vision Transformers.
Akshayvarun Subramanya
Aniruddha Saha
Soroush Abbasi Koohpayegani
Ajinkya Tejankar
Hamed Pirsiavash
Published in:
CoRR (2022)
Keyphrases
</>
computer vision
countermeasures
vision system
real time
image processing
traffic analysis
digital image watermarking
security threats
malicious attacks
database
security mechanisms
computational vision
human vision
cryptographic protocols