2018
DOI: 10.1007/978-981-10-7512-4_68
|View full text |Cite
|
Sign up to set email alerts
|

Probabilistic Model and Neural Network for Scene Classification in Traffic Surveillance System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…In this paper, we consider X2X backdoor attacks, which refer to a broad family of backdoor attacks with an arbitrary number of source classes, each assigned with an arbitrary target class. Thus, the X2X attack includes many popular attack types such as the "all-to-one" attack, "X-to-one" attack (Shen et al, 2021), "one-to-one" attack (Tran et al, 2018), and "all-to-all" attack (Gu et al, 2019). Unlike other advanced attacks that mostly rely on additional assumptions such as full control of the training process (Zhao et al, 2022;Wang et al, 2022), X2X attacks can be easily launched by poisoning the training set just like classical backdoor attacks.…”
Section: Proceedings Of Thementioning
confidence: 99%
See 2 more Smart Citations
“…In this paper, we consider X2X backdoor attacks, which refer to a broad family of backdoor attacks with an arbitrary number of source classes, each assigned with an arbitrary target class. Thus, the X2X attack includes many popular attack types such as the "all-to-one" attack, "X-to-one" attack (Shen et al, 2021), "one-to-one" attack (Tran et al, 2018), and "all-to-all" attack (Gu et al, 2019). Unlike other advanced attacks that mostly rely on additional assumptions such as full control of the training process (Zhao et al, 2022;Wang et al, 2022), X2X attacks can be easily launched by poisoning the training set just like classical backdoor attacks.…”
Section: Proceedings Of Thementioning
confidence: 99%
“…Training-phase defenses aim to obtain a backdoor-free classifier from the possibly poisoned training set (Tran et al, 2018;Chen et al, 2018;Xiang et al, 2019;Du et al, 2020;Huang et al, 2022). They can not be deployed at the user end where the classifier is already trained.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The development of the Greedy algorithm can be used by classifying the pattern of extracting data by extracting data, so the analysis of a Greedy algorithm will be clearer, therefore with the addition of the Greedy algorithm, the analysis of each violation will result in a lawsuit in the form of missing and data based on the ticket. can be accounted for legally what articles can be prosecuted in a ticket with the Greedy algorithm, the system will be assisted in analyzing an error committed by motorists on the highway with the Greedy algorithm so all decisions can be taken directly by the Greedy algorithm and results in instantaneous loss [90].…”
Section: Greedy Algorithm Developmentmentioning
confidence: 99%
“…We also evaluate defensive measures against the attack. The most popular backdoor defense detection methods, such as spectral signature detection [30] and activation clustering, [31] struggle to counteract our attack.…”
Section: Introductionmentioning
confidence: 99%