Inproceedings,

PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis.

, , , , , , , , and .
USENIX Security Symposium, page 2365-2382. USENIX Association, (2023)

Meta data

Tags

Users

  • @dblp

Comments and Reviews