Login / Signup
Launching a Robust Backdoor Attack under Capability Constrained Scenarios.
Ming Yi
Yixiao Xu
Kangyi Ding
Mingyong Yin
Xiaolei Liu
Published in:
CoRR (2023)
Keyphrases
</>
database
real world
machine learning
information retrieval
countermeasures
neural network
case study
face recognition
evolutionary algorithm
web applications
parameter tuning
attack scenarios