Fig. 1: An example of a typical backdoor attack (adapted from Wang et al. (2019) (IMAGE)

Singapore University of Technology and Design

Disclaimer: AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert system.