Cited By
View all- Ma ZYang YLiu YYang TLiu XLi TQin Z(2024)Need for Speed: Taming Backdoor Attacks with Speed and Precision2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00216(1217-1235)Online publication date: 19-May-2024
- Shree SLei YKacker RKuhn D(2024)Proxima: A Proxy Model-Based Approach to Influence Analysis2024 IEEE International Conference on Artificial Intelligence Testing (AITest)10.1109/AITest62860.2024.00016(64-72)Online publication date: 15-Jul-2024
- Hammoudeh ZLowd D(2024)Training data influence analysis and estimation: a surveyMachine Language10.1007/s10994-023-06495-7113:5(2351-2403)Online publication date: 29-Mar-2024