Login / Signup
DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints.
Zhendong Zhao
Xiaojun Chen
Yuexin Xuan
Ye Dong
Dakui Wang
Kaitai Liang
Published in:
CVPR (2022)
Keyphrases
</>
watermarking scheme
feature representation
latent variables
vector representation
feature vectors
image features
feature set
constraint satisfaction
watermarking algorithm
watermarking technique
extended gaussian image