Login / Signup
On the Effectiveness of Adversarial Training against Backdoor Attacks.
Yinghua Gao
Dongxian Wu
Jingfeng Zhang
Guanhao Gan
Shu-Tao Xia
Gang Niu
Masashi Sugiyama
Published in:
CoRR (2022)
Keyphrases
</>
watermarking scheme
training phase
security protocols
neural network
information retrieval
genetic algorithm
social networks
website
training set
active learning
supervised learning
training examples
test set
serious games
attack detection