Tags

Backdoor attack
Foundation Models
Invisible Triggers
Fake Samples
Model Inversion.
Academic
开源