• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Stealthy Backdoor Attack with Adversarial Training.

Le FengSheng LiZhenxing QianXinpeng Zhang
Published in: ICASSP (2022)
Keyphrases
  • training set
  • training phase
  • supervised learning
  • training algorithm
  • data mining
  • lower bound
  • special case
  • training examples
  • test set
  • training process
  • computer software
  • malicious users