Sign in

Mitigating Backdoor Poisoning Attacks through the Lens of Spurious Correlation.

Xuanli HeQiongkai XuJun WangBenjamin I. P. RubinsteinTrevor Cohn
Published in: CoRR (2023)
Keyphrases
  • countermeasures
  • traffic analysis
  • watermarking scheme
  • computer security
  • correlation coefficient
  • risk management
  • data sets
  • attack detection
  • malicious users