1 code implementation • 15 Dec 2023 • Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino
Despite the initial success of current audio backdoor attacks, they suffer from the following limitations: (i) Most of them require sufficient knowledge, which limits their widespread adoption.
1 code implementation • 23 Jun 2023 • Jie Wang, Zheng Yan, Jiahe Lan, Elisa Bertino, Witold Pedrycz
Among them, the spatial aggregation layer adopts a defense mechanism to robustly aggregate local trust, and the temporal aggregation layer applies an attention mechanism for effective learning of temporal patterns.