Login / Signup
Hidden Trigger Backdoor Attacks.
Aniruddha Saha
Akshayvarun Subramanya
Hamed Pirsiavash
Published in:
CoRR (2019)
Keyphrases
</>
countermeasures
watermarking scheme
terrorist attacks
traffic analysis
denial of service attacks
neural network
malicious attacks
data sets
digital images
chosen plaintext
digital image watermarking
malicious users
security risks
security threats
java card
hidden information
lightweight
optimal solution
website