Login / Signup
Mitigating Backdoor Poisoning Attacks through the Lens of Spurious Correlation.
Xuanli He
Qiongkai Xu
Jun Wang
Benjamin I. P. Rubinstein
Trevor Cohn
Published in:
CoRR (2023)
Keyphrases
</>
countermeasures
traffic analysis
watermarking scheme
computer security
correlation coefficient
risk management
data sets
attack detection
malicious users