Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain

Add code
Jul 09, 2022
Figure 1 for Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain
Figure 2 for Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain
Figure 3 for Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain
Figure 4 for Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: