no code implementations • 22 Apr 2024 • Rong Wang, Guichen Zhou, Mingjun Gao, Yunpeng Xiao
Considering the characteristics of trigger generation, data poisoning and model training in backdoor attack, this paper designs a backdoor attack method based on federated learning.