firstbacksecondback
8 Results
Workshop
|
How to Craft Backdoors with Unlabeled Data Alone? Yifei Wang · Wenhan Ma · Stefanie Jegelka · Yisen Wang |
||
Poster
|
Fri 1:45 |
Universal Backdoor Attacks Benjamin Schneider · Nils Lukas · Florian Kerschbaum |
|
Poster
|
Wed 7:30 |
Demystifying Poisoning Backdoor Attacks from a Statistical Perspective Ganghua Wang · Xun Xian · Ashish Kundu · Jayanth Srinivasa · Xuan Bi · Mingyi Hong · Jie Ding |
|
Poster
|
Fri 1:45 |
Efficient Backdoor Attacks for Deep Neural Networks in Real-world Scenarios Ziqiang Li · Hong Sun · Pengfei Xia · Heng Li · Beihao Xia · Yi Wu · Bin Li |
|
Poster
|
Fri 1:45 |
Rethinking CNN’s Generalization to Backdoor Attack from Frequency Domain Quanrui Rao · Lin Wang · Wuying Liu |
|
Poster
|
Tue 1:45 |
Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection Jiawei Liang · Siyuan Liang · Aishan Liu · Xiaojun Jia · Junhao Kuang · Xiaochun Cao |
|
Poster
|
Thu 7:30 |
Rethinking Backdoor Attacks on Dataset Distillation: A Kernel Method Perspective Ming-Yu Chung · Sheng-Yen Chou · Chia-Mu Yu · Pin-Yu Chen · Sy-Yen Kuo · Tsung-Yi Ho |
|
Poster
|
Thu 7:30 |
Influencer Backdoor Attack on Semantic Segmentation Haoheng Lan · Jindong Gu · Philip Torr · Hengshuang Zhao |