no code implementations • 22 Apr 2024 • Rong Wang, Guichen Zhou, Mingjun Gao, Yunpeng Xiao
Considering the characteristics of trigger generation, data poisoning and model training in backdoor attack, this paper designs a backdoor attack method based on federated learning.
1 code implementation • 6 Jun 2022 • Yunpeng Xiao, Youpeng Zhao, Ge Yang
Fully supervised deep learning models developed for this task achieve excellent performance but require substantial amounts of annotated data for training.