Login / Signup
Transpose Attack: Stealing Datasets with Bidirectional Training.
Guy Amit
Moshe Levy
Yisroel Mirsky
Published in:
CoRR (2023)
Keyphrases
</>
training set
training dataset
linear svm
database
benchmark datasets
test set
raw data
training data
uci machine learning repository
training algorithm
training process
online learning
supervised learning
authentication protocol
image classification
detection mechanism
attack detection
trained classifiers