On Trojan Signatures in Large Language Models of Code Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Mohammad Amin Alipour | Published: 2024-02-23 | Updated: 2024-03-07 LLMセキュリティトロイの木馬の署名トロイの木馬検出 2024.02.23 2025.04.03 文献データベース
An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks Authors: Xinqiao Zhang, Huili Chen, Ke Huang, Farinaz Koushanfar | Published: 2022-04-08 トロイの木馬の署名トロイの木馬検出バックドア攻撃 2022.04.08 2025.04.03 文献データベース
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Radha Poovendran | Published: 2022-03-25 トロイの木馬の署名知識の蒸留防御手法 2022.03.25 2025.04.03 文献データベース