Login / Signup
Rethinking the Trigger of Backdoor Attack.
Yiming Li
Tongqing Zhai
Baoyuan Wu
Yong Jiang
Zhifeng Li
Shutao Xia
Published in:
CoRR (2020)
Keyphrases
</>
detection mechanism
attack detection
real time
neural network
website
case study
countermeasures
ddos attacks
malicious attacks
attack graph
artificial intelligence
information systems
optimal solution
anomaly detection
dos attacks
key exchange protocol