1 code implementation • 12 Jul 2022 • Yuhua Sun, Tailai Zhang, Xingjun Ma, Pan Zhou, Jian Lou, Zichuan Xu, Xing Di, Yu Cheng, Lichao
In this paper, we propose two novel Density Manipulation Backdoor Attacks (DMBA$^{-}$ and DMBA$^{+}$) to attack the model to produce arbitrarily large or small density estimations.
no code implementations • 24 Feb 2021 • Chun-e Zhao, Wenping Ma, Tongjiang Yan, Yuhua Sun
The size of a CAC is the number of potential users that can be supported in the system.
Information Theory Information Theory