no code implementations • 11 Jul 2020 • Chuanshuai Chen, Jiazhu Dai
In this paper, through analyzing the changes in inner LSTM neurons, we proposed a defense method called Backdoor Keyword Identification (BKI) to mitigate backdoor attacks which the adversary performs against LSTM-based text classification by data poisoning.
1 code implementation • 29 May 2019 • Jiazhu Dai, Chuanshuai Chen
When the backdoor is injected, the model will misclassify any text samples that contains a specific trigger sentence into the target category determined by the adversary.
Cryptography and Security