no code implementations • 9 May 2024 • Binxiao Huang, Jason Chun Lok, Chang Liu, Ngai Wong
To exploit the abundant information contained in the input data to output label mapping, our scheme utilizes the network trained from the clean dataset as a trigger generator to produce poisons that significantly raise the success rate of backdoor attacks versus conventional approaches.