Privacy Backdoors: Stealing Data with Corrupted Pretrained Models

Add code
Mar 30, 2024
Figure 1 for Privacy Backdoors: Stealing Data with Corrupted Pretrained Models
Figure 2 for Privacy Backdoors: Stealing Data with Corrupted Pretrained Models
Figure 3 for Privacy Backdoors: Stealing Data with Corrupted Pretrained Models
Figure 4 for Privacy Backdoors: Stealing Data with Corrupted Pretrained Models

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: