Invisible Backdoor Attacks Against Deep Neural Networks.
Shaofeng LiBenjamin Zi Hao ZhaoJiahao YuMinhui XueDali KaafarHaojin ZhuPublished in: CoRR (2019)
Keyphrases
- neural network
- pattern recognition
- genetic algorithm
- neural network model
- back propagation
- countermeasures
- fuzzy logic
- neural nets
- multilayer perceptron
- recurrent neural networks
- artificial neural networks
- watermarking scheme
- image watermarking
- denial of service attacks
- malicious attacks
- feed forward
- data sets
- training process
- machine learning
- computer security
- security protocols
- traffic analysis
- terrorist attacks
- attack detection
- malicious users