Most existing methods to detect backdoored machine learning (ML) models ...
In this paper, we present a simple yet surprisingly effective technique ...
With extensive studies on backdoor attack and detection, still fundament...
Neural text ranking models have witnessed significant advancement and ar...
The IoT (Internet of Things) technology has been widely adopted in recen...
A security threat to deep neural networks (DNN) is backdoor contaminatio...
Accurate face recognition techniques make a series of critical applicati...
To attack a deep neural network (DNN) based Face Recognition (FR) system...
Face authentication systems are becoming increasingly prevalent, especia...