A General Framework for Defending Against Backdoor Attacks via Influence Graph.
Xiaofei SunJiwei LiXiaoya LiZiyao WangTianwei ZhangHan QiuFei WuChun FanPublished in: CoRR (2021)
Keyphrases
- ddos attacks
- graph model
- graph theory
- random walk
- bipartite graph
- graph mining
- graph representation
- graph theoretic
- graph matching
- terrorist attacks
- traffic analysis
- countermeasures
- graph partitioning
- information diffusion
- information propagation
- denial of service attacks
- graph based algorithm
- security threats
- seed set
- graph construction
- security protocols
- graph databases
- directed acyclic graph
- weighted graph
- graph structure
- complex networks
- structured data