Research Article

Detection of Trojaning Attack on Neural Networks via Cost of Sample Classification

Figure 4

The distribution of node sensitivity in trojaned neural networks. (a) Face recognition model. (A) The fc8 layer. (B) The fc7 layer. (C) The fc6 layer. (b) Age recognition model. (A) The fc8 layer. (B) The fc7 layer. (C) The fc6 layer.
(a)
(b)