Everyone Can Attack: Repurpose Lossy Compression as a Natural Backdoor Attack

Open in new window