Fine-Tuning Is All You Need to Mitigate Backdoor Attacks.
Zeyang ShaXinlei HePascal BerrangMathias HumbertYang ZhangPublished in: CoRR (2022)
Keyphrases
- fine tuning
- viable alternative
- fine tune
- malicious attacks
- watermarking scheme
- countermeasures
- fine tuned
- watermarking algorithm
- computer security
- data sets
- malicious users
- ddos attacks
- security threats
- chosen plaintext
- database
- terrorist attacks
- denial of service attacks
- digital watermarking
- security mechanisms
- signal processing
- data mining