Alert button

Textual Backdoor Attacks with Iterative Trigger Injection

May 25, 2022
Jun Yan, Vansh Gupta, Xiang Ren

Figure 1 for Textual Backdoor Attacks with Iterative Trigger Injection
Figure 2 for Textual Backdoor Attacks with Iterative Trigger Injection
Figure 3 for Textual Backdoor Attacks with Iterative Trigger Injection
Figure 4 for Textual Backdoor Attacks with Iterative Trigger Injection

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: