Topics

No keywords indexed for this article. Browse by subject →

References
23
[3]
Gu "BadNets: Identifying vulnerabilities in the machine learning model supply chain" arXiv:1708.06733 (2019)
[4]
Chen "Targeted backdoor attacks on deep learning systems using data poisoning" arXiv:1712.05526 (2017)
[5]
Liao "Backdoor embedding in convolutional neural network models via invisible perturbation" arXiv:1808.10307 (2018)
[7]
Turner (2018)
[9]
Shafahi "Poison frogs! targeted clean-label poisoning attacks on neural networks" arXiv:1804.00792 (2018)
[15]
Chen "Detecting backdoor attacks on deep neural networks by activation clustering" arXiv:1811.03728 (2018)
[19]
Tran "Spectral signatures in backdoor attacks" arXiv:1811.00636 (2018)
[20]
Guo "AEVA: Black-box backdoor detection using adversarial extreme value analysis" arXiv:2110.14880 (2022)
[22]
O’shea "Radio machine learning dataset generation with gnu radio"
[23]
Krizhevsky "ImageNet classification with deep convolutional neural networks"
Related

You May Also Like

MAGIC—Memristor-Aided Logic

Shahar Kvatinsky, Dmitry Belousov · 2014

658 citations

VTEAM: A General Model for Voltage-Controlled Memristors

Shahar Kvatinsky, Misbah Ramadan · 2015

624 citations