A Backdoor Attack Scheme with Invisible Triggers Based on Model Architecture Modification

Open in new window