Loading...
The system can't perform the operation now. Try again later.
Articles
Case law
Profiles
My profile
My library
Metrics
Alerts
Settings
Get journal articles
Get journal articles
Profiles
My profile
My library
Yue Zhao
University of Chinese Academy of Sciences
Verified email at iie.ac.cn
Cited by 834
machine learning security
adversarial attack
backdoor attack
Circular-SAR
Jun Yan
Google
Verified email at google.com
Cited by 777
Trustworthy NLP
AI Safety
Robustness
Backdoor Attack
Wenbo Jiang
University of Electronic Science and Technology of China
Verified email at uestc.edu.cn
Cited by 343
AI security
Backdoor attack
Kota Yoshida
Ritsumeikan University
Verified email at fc.ritsumei.ac.jp
Cited by 285
Deep neural network
hardware security
side-channel attack
backdoor attack
adversarial examples
Shuai Zhao
Nanyang Technological University; Jinan University
Verified email at ntu.edu.sg
Cited by 247
Natural Language Processing
Backdoor Attack
Tong Wang
Nanjing University
Verified email at smail.nju.edu.cn
Cited by 100
Backdoor Attack
Backdoor Defense
Data Poisoning
Data Debugging
Mengxuan Hu
The University of Virginia
Verified email at uga.edu
Cited by 97
Deep Learning
XAI
Causal Inference
Backdoor Attack
Yu Feng
The University of Sydney
Verified email at uni.sydney.edu.au
Cited by 93
backdoor attack
federated learning
medical image analysis
Hui Zeng
National University of Defense Technology
Verified email at nudt.edu.cn
Cited by 86
Federated Learning
Backdoor Attack
Shuo Shao
Ph.D Student, Zhejiang University
Verified email at zju.edu.cn
Cited by 70
Copyright Protection in AI
Backdoor Attack
AI Security
AI Explainability
1 - 10
Privacy
Terms
Help
About Scholar
Search help