Login / Signup
Backdoor Attack with Sparse and Invisible Trigger.
Yinghua Gao
Yiming Li
Xueluan Gong
Shu-Tao Xia
Qian Wang
Published in:
CoRR (2023)
Keyphrases
</>
sparse data
high dimensional
neural network
countermeasures
real time
feature selection
lower bound
sparse representation
sparse coding
compressive sensing
malicious attacks
key exchange protocol