"Everyone Can Attack: Repurpose Lossy Compression as a Natural Backdoor Attack."

Sze Jue Yang et al. (2023)

Details and statistics

DOI: 10.48550/ARXIV.2308.16684

access: open

type: Informal or Other Publication

metadata version: 2024-01-02

a service of  Schloss Dagstuhl - Leibniz Center for Informatics