no code implementations • 16 Sep 2023 • Yaguan Qian, Boyuan Ji, Shuke He, Shenhui Huang, Xiang Ling, Bin Wang, Wei Wang
However, these models are vulnerable to backdoor attacks.
Backdoor Attack Object +2