Backdoor defense via deconfounded representation learning

Z Zhang, Q Liu, Z Wang, Z Lu… - Proceedings of the IEEE …, 2023 - openaccess.thecvf.com
Deep neural networks (DNNs) are recently shown to be vulnerable to backdoor attacks,
where attackers embed hidden backdoors in the DNN model by injecting a few poisoned …

Backdoor Defense via Deconfounded Representation Learning

Z Zhang, Q Liu, Z Wang, Z Lu, Q Hu - cvpr.thecvf.com
Backdoor Defense via Deconfounded Representation Learning Page 1 Backdoor Defense via
Deconfounded Representation Learning Zaixi Zhang1, Qi Liu1*, Zhicai Wang1, Zepu Lu1 …

[PDF][PDF] Backdoor Defense via Deconfounded Representation Learning

Z Zhang, Q Liu, Z Wang, Z Lu, Q Hu - staff.ustc.edu.cn
Deep neural networks (DNNs) are recently shown to be vulnerable to backdoor attacks,
where attackers embed hidden backdoors in the DNN model by injecting a few poisoned …

Backdoor Defense via Deconfounded Representation Learning

Z Zhang, Q Liu, Z Wang, Z Lu… - 2023 IEEE/CVF …, 2023 - ieeexplore.ieee.org
Deep neural networks (DNNs) are recently shown to be vulnerable to backdoor attacks,
where attackers embed hidden backdoors in the DNN model by injecting a few poisoned …

Backdoor Defense via Deconfounded Representation Learning

Z Zhang, Q Liu, Z Wang, Z Lu, Q Hu - 2023 IEEE/CVF Conference on …, 2023 - computer.org
Deep neural networks (DNNs) are recently shown to be vulnerable to backdoor attacks,
where attackers embed hidden backdoors in the DNN model by injecting a few poisoned …

Backdoor Defense via Deconfounded Representation Learning

Z Zhang, Q Liu, Z Wang, Z Lu, Q Hu - arXiv e-prints, 2023 - ui.adsabs.harvard.edu
Deep neural networks (DNNs) are recently shown to be vulnerable to backdoor attacks,
where attackers embed hidden backdoors in the DNN model by injecting a few poisoned …

Backdoor Defense via Deconfounded Representation Learning

Z Zhang, Q Liu, Z Wang, Z Lu, Q Hu - arXiv preprint arXiv:2303.06818, 2023 - arxiv.org
Deep neural networks (DNNs) are recently shown to be vulnerable to backdoor attacks,
where attackers embed hidden backdoors in the DNN model by injecting a few poisoned …