1 code implementation • COLING 2022 • Heng-yang Lu, Chenyou Fan, Jun Yang, Cong Hu, Wei Fang, Xiao-Jun Wu
Based on the predicted P2P, four effective strategies are introduced to show the BDA performance.
Backdoor Attack