Login / Signup
Trojan Source: Invisible Vulnerabilities.
Nicholas Boucher
Ross Anderson
Published in:
USENIX Security Symposium (2023)
Keyphrases
</>
machine learning
information security
multiple sources
information retrieval
artificial intelligence
data structure
social network analysis
countermeasures
security issues
security vulnerabilities