Login / Signup
Stealthy Backdoor Attack with Adversarial Training.
Le Feng
Sheng Li
Zhenxing Qian
Xinpeng Zhang
Published in:
ICASSP (2022)
Keyphrases
</>
training set
training phase
supervised learning
training algorithm
data mining
lower bound
special case
training examples
test set
training process
computer software
malicious users