Proceedings of the 39th International Conference on Computer-Aided Design 2020
DOI: 10.1145/3400302.3415671
|View full text |Cite
|
Sign up to set email alerts
|

CleaNN

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 20 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…Finally, some methods explore stacking multiple binary tests to create more robust defenses. For instance, the CleaNN defense [157] uses two anomaly detectors: one at the input level using frequency analysis to detect suspicious patterns in an image; the other at one of the suspicious DNN's intermediary layers so as to capture abnormal features associated with the image's representations. Any of the two detectors being triggered leads to the defense rejecting the input.…”
Section: ) Data-based Backdoor Defensesmentioning
confidence: 99%
“…Finally, some methods explore stacking multiple binary tests to create more robust defenses. For instance, the CleaNN defense [157] uses two anomaly detectors: one at the input level using frequency analysis to detect suspicious patterns in an image; the other at one of the suspicious DNN's intermediary layers so as to capture abnormal features associated with the image's representations. Any of the two detectors being triggered leads to the defense rejecting the input.…”
Section: ) Data-based Backdoor Defensesmentioning
confidence: 99%