Search Results for author: Panagiota Kiourti

Found 3 papers, 1 papers with code

Dormant Neural Trojans

no code implementations2 Nov 2022 Feisi Fu, Panagiota Kiourti, Wenchao Li

We present a novel methodology for neural network backdoor attacks.

MISA: Online Defense of Trojaned Models using Misattributions

no code implementations29 Mar 2021 Panagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, Susmit Jha

Recent studies have shown that neural networks are vulnerable to Trojan attacks, where a network is trained to respond to specially crafted trigger patterns in the inputs in specific and potentially malicious ways.

Traffic Sign Recognition

TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents

2 code implementations1 Mar 2019 Panagiota Kiourti, Kacper Wardega, Susmit Jha, Wenchao Li

Recent work has identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan attacks at training time.

Data Poisoning General Classification +2

Cannot find the paper you are looking for? You can Submit a new open access paper.