Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack

    Deep learning is widely applied to various areas for its great performance. However, it is vulnerable to adversarial attacks and poisoning attacks, which arouses a lot of concerns. A number of attack methods a...

    **yin Chen, Haibin Zheng, Mengmeng Su, Tianyu Du in Information Security and Cryptology (2020)