Backdoor Attacks on Crowd Counting.
Yuhua SunTailai ZhangXingjun MaPan ZhouJian LouZichuan XuXing DiYu ChengLichao SunPublished in: CoRR (2022)
Keyphrases
- countermeasures
- malicious attacks
- terrorist attacks
- traffic analysis
- crowd sourced
- ddos attacks
- chosen plaintext
- malicious users
- attack detection
- computer security
- special case
- security protocols
- data sets
- image watermarking
- security threats
- watermarking scheme
- wireless sensor networks
- cooperative
- data mining
- neural network