Sign in

Reverse engineering imperceptible backdoor attacks on deep neural networks for detection and training set cleansing.

Zhen XiangDavid J. MillerGeorge Kesidis
Published in: Comput. Secur. (2021)
Keyphrases