Login / Signup
Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation.
Tong Wu
Tianhao Wang
Vikash Sehwag
Saeed Mahloujifar
Prateek Mittal
Published in:
AISec@CCS (2022)
Keyphrases
</>
geometric transformations
image transformations
linear transformation
countermeasures
rotation invariant
security mechanisms
intrinsic parameters
computer vision
security protocols
malicious attacks
orthogonal projection
watermarking scheme
security issues
terrorist attacks
malicious users