Effective Backdoor Defense by Exploiting Sensitivity of Poisoned Samples Weixin Chen 1

Open in new window