Odyssey: Creation, Analysis and Detection of Trojan Models
IEEE Transactions on Information Forensics and Security(2021)
Key words
Trojan horses,Training,Data models,Detectors,Computational modeling,Training data,Perturbation methods,Trojan attack,Trojan model,Trojan detection,Trojan Dataset,model properties
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined