Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation

Add code
Jul 22, 2022
Figure 1 for Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation
Figure 2 for Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation
Figure 3 for Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation
Figure 4 for Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: