Alert button

Invisible Backdoor Attack Through Singular Value Decomposition

Mar 18, 2024
Wenmin Chen, Xiaowei Xu

Figure 1 for Invisible Backdoor Attack Through Singular Value Decomposition
Figure 2 for Invisible Backdoor Attack Through Singular Value Decomposition
Figure 3 for Invisible Backdoor Attack Through Singular Value Decomposition
Figure 4 for Invisible Backdoor Attack Through Singular Value Decomposition

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: