Rethinking the Reverse-engineering of Trojan Triggers
–Neural Information Processing Systems
Deep Neural Networks are vulnerable to Trojan (or backdoor) attacks. Reverse-engineering methods can reconstruct the trigger and thus identify affected models. Existing reverse-engineering methods only consider input space constraints, e.g.,
Neural Information Processing Systems
Oct-9-2025, 15:16:31 GMT
- Genre:
- Research Report > New Finding (0.68)
- Industry:
- Information Technology > Security & Privacy (1.00)
- Technology: