Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
Jul 9, 2024 · Abstract:As asynchronous event data is more frequently engaged in various vision tasks, the risk of backdoor attacks becomes more evident.
Sep 29, 2024 · This paper has uncovered the possibility of directly poisoning event data streams by proposing Event Trojan framework, including two kinds of triggers.
The event data consists of all discrete events within a certain time period. with asynchronous sensors that respond to brightness changes in a scene asyn-. 034.
Event Trojan. Event Trojan: Asynchronous Event-based Backdoor Attacks. This repository is the officially implemented event trojan described in Wang et al.
Oct 1, 2024 · As asynchronous event data is more frequently engaged in various vision tasks, the risk of backdoor attacks becomes more evident. However, ...
Jul 15, 2024 · The paper introduces a new class of backdoor attacks called "Event Trojan" that exploit asynchronous events to trigger malicious behavior.
Sep 29, 2024 · Event Trojan: Asynchronous Event-Based Backdoor Attacks. Ruofei Wang. Qing Guo. Haoliang Li. Renjie Wan. SID: yKREQg4C. DOI: 10.1007/978-3-031 ...
People also ask
1. Event Trojan. 85.61. Event Trojan: Asynchronous Event-based Backdoor Attacks ; 2. ECSNet. 69.3. Ecsnet: Spatio-temporal feature learning for event camera.
In this paper, we propose the Pre-trained Trojan attack, which embeds backdoors into a PVM, enabling attacks across various downstream vision tasks. We ...
Event Trojan: Asynchronous Event-based Backdoor Attacks, Ruofei Wang, Qing Guo, Haoliang Li, Renjie Wan, 2024-07-11, arXiv, https://github.com/rfww/EventTrojan ...