Live Trojan Attacks on Deep Neural Networks.
Robby CostalesChengzhi MaoRaphael NorwitzBryan KimJunfeng YangPublished in: CoRR (2020)
Keyphrases
- neural network
- countermeasures
- pattern recognition
- traffic analysis
- real time
- artificial neural networks
- data sets
- genetic algorithm
- multilayer perceptron
- fuzzy systems
- multi layer
- malicious attacks
- deep learning
- network architecture
- recurrent neural networks
- feed forward
- back propagation
- fuzzy logic
- information systems
- learning algorithm