Login / Signup

Stealthy Backdoor Attack with Adversarial Training.

Le FengSheng LiZhenxing QianXinpeng Zhang
Published in: ICASSP (2022)
Keyphrases
  • training set
  • training phase
  • supervised learning
  • training algorithm
  • data mining
  • lower bound
  • special case
  • training examples
  • test set
  • training process
  • computer software
  • malicious users