Author:
Chen Jinyin,Zheng Haibin,Su Mengmeng,Du Tianyu,Lin Changting,Ji Shouling
Publisher
Springer International Publishing
Reference41 articles.
1. Adi, Y., Baum, C., Cisse, M., Pinkas, B., Keshet, J.: Turning your weakness into a strength: watermarking deep neural networks by backdooring. In: 27th $$\{$$USENIX$$\}$$ Security Symposium ($$\{$$USENIX$$\}$$ Security 18), pp. 1615–1631 (2018)
2. Akhtar, N., Mian, A.: Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 6, 14410–14430 (2018)
3. Lecture Notes in Computer Science;M Alberti,2019
4. Chen, H., Rohani, B.D., Koushanfar, F.: DeepMarks: a digital fingerprinting framework for deep neural networks. arXiv preprint arXiv:1804.03648 (2018)
5. Chen, J., Hu, K., Yang, Y., Liu, Y., Xuan, Q.: Collective transfer learning for defect prediction. Neurocomputing (2019)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Federated Unlearning in the Internet of Vehicles;2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S);2024-06-24
2. Feature Transfer-Based Stealthy Poisoning Attack for DNNs;Attacks, Defenses and Testing for Deep Learning;2024
3. SDBC: A Novel and Effective Self-Distillation Backdoor Cleansing Approach;Communications in Computer and Information Science;2023-11-26
4. Rethinking the Robustness of Graph Neural Networks;Big Data and Social Computing;2023
5. An Ontological Knowledge Base of Poisoning Attacks on Deep Neural Networks;Applied Sciences;2022-10-31