Publication | Closed Access
With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning
92
Citations
33
References
2018
Year
Practical AttacksEngineeringMachine LearningData ScienceEvasion TechniqueAttack ModelAdversarial Machine LearningComputer ScienceTransfer LearningSide-channel AttackData Security
| Year | Citations | |
|---|---|---|
Page 1
Page 1