WeChat Mini Program
Old Version Features

Invisible Intruders: Label-Consistent Backdoor Attack Using Re-parameterized Noise Trigger

IEEE TRANSACTIONS ON MULTIMEDIA(2024)

Cited 0|Views3
Key words
Backdoor attack,image steganography,label consistency,label consistency,Re-parameterized noise,Re-parameterized noise,label consistency,Re-parameterized noise
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined