Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation.
Tong WuTianhao WangVikash SehwagSaeed MahloujifarPrateek MittalPublished in: CoRR (2022)
Keyphrases
- intrinsic parameters
- geometric transformations
- rotation invariant
- image transformations
- countermeasures
- camera calibration
- terrorist attacks
- computer security
- malicious attacks
- linear transformation
- d objects
- scene structure
- watermarking algorithm
- traffic analysis
- security risks
- denial of service attacks
- focal length
- watermarking scheme
- orthogonal projection