Alert button

Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain

Jul 09, 2022
Chang Yue, Peizhuo Lv, Ruigang Liang, Kai Chen

Figure 1 for Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain
Figure 2 for Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain
Figure 3 for Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain
Figure 4 for Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: