Complex Backdoor Detection by Symmetric Feature Differencing | 0 | 0.34 | 2022 |
Constrained Optimization with Dynamic Bound-scaling for Effective NLP Backdoor Defense. | 0 | 0.34 | 2022 |
Better Trigger Inversion Optimization in Backdoor Scanning | 0 | 0.34 | 2022 |
To What Extent Do Dnn-Based Image Classification Models Make Unreliable Inferences? | 0 | 0.34 | 2021 |
Towards Feature Space Adversarial Attack By Style Perturbation | 0 | 0.34 | 2021 |
Backdoor Scanning for Deep Neural Networks through K-Arm Optimization | 0 | 0.34 | 2021 |
Correlations between deep neural network model coverage criteria and model quality | 7 | 0.42 | 2020 |
Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features | 3 | 0.42 | 2020 |
Black-box Adversarial Sample Generation Based on Differential Evolution | 3 | 0.44 | 2020 |
Programming support for autonomizing software | 0 | 0.34 | 2019 |
White-box program tuning | 0 | 0.34 | 2019 |
Trojaning Attack on Neural Networks. | 24 | 0.73 | 2018 |
LAMP: data provenance for graph based machine learning algorithms through derivative computation | 5 | 0.43 | 2017 |