Research Article
Detection of Trojaning Attack on Neural Networks via Cost of Sample Classification
Figure 4
The distribution of node sensitivity in trojaned neural networks. (a) Face recognition model. (A) The fc8 layer. (B) The fc7 layer. (C) The fc6 layer. (b) Age recognition model. (A) The fc8 layer. (B) The fc7 layer. (C) The fc6 layer.
(a) |
(b) |