DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints

Summary

This is a publication. If there is no link to the publication on this page, you can try the pre-formated search via the search engines listed on this page.

Authors: Zhao, Zhendong, Chen, Xiaojun, Xuan, Yuexin, Dong, Ye, Wang, Dakui, Liang, Kaitai

Journal publisher: Zenodo

Published year: 2022

DOI identifier: 10.1109/cvpr52688.2022.01478