1 code implementation • 1 Nov 2021 • Dahoon Park, Kon-Woo Kwon, Sunghoon Im, Jaeha Kung
Many prior works on adversarial weight attack require not only the weight parameters, but also the training or test dataset in searching vulnerable bits to be attacked.