Login / Signup
BATT: Backdoor Attack with Transformation-based Triggers.
Tong Xu
Yiming Li
Yong Jiang
Shu-Tao Xia
Published in:
CoRR (2022)
Keyphrases
</>
active databases
special case
countermeasures
malicious users
neural network
website
linear transformation
malicious attacks