Search Results for Poisoning - Narrowed by: Computer networks&nbsp;. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dPoisoning$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$0025C2$0025A0.$002509Computer$002bnetworks$0025C2$0025A0.$0026ps$003d300?dt=list 2026-03-20T17:46:52Z Attacks, Defenses and Testing for Deep Learning ent://SD_ILS/0/SD_ILS:603831 2026-03-20T17:46:52Z 2026-03-20T17:46:52Z Author&#160;Chen, Jinyin. author. (orcid)0000-0002-7153-2755&#160;Zhang, Ximin. author.&#160;Zheng, Haibin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0425-5">https://doi.org/10.1007/978-981-97-0425-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Backdoor Attacks against Learning-Based Algorithms ent://SD_ILS/0/SD_ILS:603703 2026-03-20T17:46:52Z 2026-03-20T17:46:52Z Author&#160;Li, Shaofeng. author.&#160;Zhu, Haojin. author.&#160;Wu, Wen. author.&#160;Shen, Xuemin (Sherman). author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-57389-7">https://doi.org/10.1007/978-3-031-57389-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>