Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1)
  • Open Access

    ARTICLE

    An Improved Optimized Model for Invisible Backdoor Attack Creation Using Steganography

    Daniyal M. Alghazzawi1, Osama Bassam J. Rabie1, Surbhi Bhatia2, Syed Hamid Hasan1,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1173-1193, 2022, DOI:10.32604/cmc.2022.022748

    Abstract The Deep Neural Networks (DNN) training process is widely affected by backdoor attacks. The backdoor attack is excellent at concealing its identity in the DNN by performing well on regular samples and displaying malicious behavior with data poisoning triggers. The state-of-art backdoor attacks mainly follow a certain assumption that the trigger is sample-agnostic and different poisoned samples use the same trigger. To overcome this problem, in this work we are creating a backdoor attack to check their strength to withstand complex defense strategies, and in order to achieve this objective, we are developing an improved Convolutional Neural Network (ICNN) model… More >

Displaying 1-10 on page 1 of 1. Per Page