Login / Signup
Hidden Trigger Backdoor Attacks.
Aniruddha Saha
Akshayvarun Subramanya
Hamed Pirsiavash
Published in:
AAAI (2020)
Keyphrases
</>
countermeasures
attack detection
watermarking scheme
chosen plaintext
hidden information
cyber attacks
security threats
traffic analysis
denial of service attacks
malicious attacks
detect malicious
image watermarking
data publishing
security risks
ddos attacks
malicious users
digital image watermarking
data mining