2 code implementations • 15 Dec 2017 • Xinyun Chen, Chang Liu, Bo Li, Kimberly Lu, Dawn Song
In this work, we consider a new type of attacks, called backdoor attacks, where the attacker's goal is to create a backdoor into a learning-based authentication system, so that he can easily circumvent the system by leveraging the backdoor.