Picture for Haoti Zhong

Haoti Zhong

Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation

Add code
Aug 30, 2018
Figure 1 for Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
Figure 2 for Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
Figure 3 for Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
Figure 4 for Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
Viaarxiv icon