Login / Signup

Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models.

Shawn ShanWenxin DingEmily WengerHaitao ZhengBen Y. Zhao
Published in: CCS (2022)
Keyphrases