Sign in

From adversarial examples to data poisoning instances: utilizing an adversarial attack method to poison a transfer learning model.

Jing LinRyan LuleyKaiqi Xiong
Published in: ICC (2022)
Keyphrases