1 code implementation • 18 Aug 2023 • Binhao Ma, Jiahui Wang, Dejun Wang, Bo Meng
DFB is unique in its independence from training data access, requiring solely the knowledge of a specific target class.
Backdoor Attack backdoor defense