Search Results for author: Haoti Zhong

Found 1 papers, 0 papers with code

Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation

no code implementations30 Aug 2018 Cong Liao, Haoti Zhong, Anna Squicciarini, Sencun Zhu, David Miller

Such popularity, however, may attract attackers to exploit the vulnerabilities of the deployed deep learning models and launch attacks against security-sensitive applications.

Data Poisoning General Classification +1

Cannot find the paper you are looking for? You can Submit a new open access paper.