Skip to yearly menu bar Skip to main content


Poster

Mitigating Backdoor Attacks via Trigger Reconstruction and Model Hardening

Guanhong Tao · Siyuan Cheng · Guangyu Shen · Yingqi Liu · Shengwei An · ZHUO ZHANG · Zhenting Wang · Hanxi Guo · Xiangyu Zhang

Abstract

Log in and register to view live content