LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning.
Siyuan ChengGuanhong TaoYingqi LiuGuangyu ShenShengwei AnShiwei FengXiangzhe XuKaiyuan ZhangShiqing MaXiangyu ZhangPublished in: CoRR (2024)
Keyphrases
- countermeasures
- malicious attacks
- computer security
- neural network
- malicious users
- special case
- terrorist attacks
- watermarking scheme
- traffic analysis
- image watermarking
- security threats
- principal direction
- data sets
- data corruption
- ddos attacks
- digital watermarking
- operating system
- multiscale
- genetic algorithm
- data mining