Search Results for author: Dakui Wang

Found 2 papers, 0 papers with code

DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints

no code implementations CVPR 2022 Zhendong Zhao, Xiaojun Chen, Yuexin Xuan, Ye Dong, Dakui Wang, Kaitai Liang

Backdoor attack is a type of serious security threat to deep learning models. An adversary can provide users with a model trained on poisoned data to manipulate prediction behavior in test stage using a backdoor.

Backdoor Attack

Comment on "Clustering by fast search and find of density peaks"

no code implementations18 Jan 2015 Shuliang Wang, Dakui Wang, Caoyuan Li, Yan Li

For any data set to be clustered, the most reasonable value of d_c can be objectively calculated from the data set by using our proposed method.

Clustering

Cannot find the paper you are looking for? You can Submit a new open access paper.