_ | trojan | _ |
BppAttack: Stealthy and Efficient | trojan | Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning |
Can Optical | trojan | s Assist Adversarial Perturbations? |
Hardly Perceptible | trojan | Attack Against Neural Networks with Bit Flips |
Live | trojan | Attacks on Deep Neural Networks |
Practical Detection of | trojan | Neural Networks: Data-limited and Data-free Cases |
ProFlip: Targeted | trojan | Attack with Progressive Bit Flips |
Quarantine: Sparsity Can Uncover the | trojan | Attack Trigger for Free |
TBT: Targeted Neural Network Attack With Bit | trojan | |
Towards Effective and Robust Neural | trojan | Defenses via Input Filtering |
| trojan | Signatures in DNN Weights |
TrojDiff: | trojan | Attacks on Diffusion Models with Diverse Targets |
TrojViT: | trojan | Insertion in Vision Transformers |
12 for trojan