Live Trojan Attacks on Deep Neural Networks.
Robby CostalesChengzhi MaoRaphael NorwitzBryan KimJunfeng YangPublished in: CVPR Workshops (2020)
Keyphrases
- neural network
- countermeasures
- pattern recognition
- fuzzy logic
- genetic algorithm
- back propagation
- recurrent neural networks
- neural network model
- self organizing maps
- fault diagnosis
- artificial neural networks
- multilayer perceptron
- watermarking scheme
- denial of service attacks
- malicious attacks
- data sets
- multi layer
- fuzzy systems
- web services
- activation function
- security protocols
- image watermarking
- java card
- security risks
- malicious users