Robust Backdoor Removal by Reconstructing Trigger-Activated Changes in Latent Representation

Open in new window