Long-Tailed Backdoor Attack Using Dynamic Data Augmentation Operations

Add code
Oct 16, 2024
Figure 1 for Long-Tailed Backdoor Attack Using Dynamic Data Augmentation Operations
Figure 2 for Long-Tailed Backdoor Attack Using Dynamic Data Augmentation Operations
Figure 3 for Long-Tailed Backdoor Attack Using Dynamic Data Augmentation Operations
Figure 4 for Long-Tailed Backdoor Attack Using Dynamic Data Augmentation Operations

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: