Nov. 30, 2022, 2:10 a.m. | Linkun Fan, Fazhi He, Qing Guo, Wei Tang, Xiaolin Hong, Bing Li

cs.CR updates on arXiv.org arxiv.org

For saving cost, many deep neural networks (DNNs) are trained on third-party
datasets downloaded from internet, which enables attacker to implant backdoor
into DNNs. In 2D domain, inherent structures of different image formats are
similar. Hence, backdoor attack designed for one image format will suite for
others. However, when it comes to 3D world, there is a huge disparity among
different 3D data structures. As a result, backdoor pattern designed for one
certain 3D data structure will be disable for …

backdoor

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Security Officer Level 1 (L1)

@ NTT DATA | Virginia, United States of America

Alternance - Analyste VOC - Cybersécurité - Île-De-France

@ Sopra Steria | Courbevoie, France

Senior Security Researcher, SIEM

@ Huntress | Remote US or Remote CAN

Cyber Security Engineer Lead

@ ASSYSTEM | Bridgwater, United Kingdom