Login / Signup

Launching a Robust Backdoor Attack under Capability Constrained Scenarios.

Ming YiYixiao XuKangyi DingMingyong YinXiaolei Liu
Published in: CoRR (2023)
Keyphrases
  • database
  • real world
  • machine learning
  • information retrieval
  • countermeasures
  • neural network
  • case study
  • face recognition
  • evolutionary algorithm
  • web applications
  • parameter tuning
  • attack scenarios