Alert button

Imperceptible Backdoor Attack: From Input Space to Feature Representation

Add code
Bookmark button
Alert button
May 06, 2022
Nan Zhong, Zhenxing Qian, Xinpeng Zhang

Figure 1 for Imperceptible Backdoor Attack: From Input Space to Feature Representation
Figure 2 for Imperceptible Backdoor Attack: From Input Space to Feature Representation
Figure 3 for Imperceptible Backdoor Attack: From Input Space to Feature Representation
Figure 4 for Imperceptible Backdoor Attack: From Input Space to Feature Representation

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: