Research Article

Detection of Trojaning Attack on Neural Networks via Cost of Sample Classification

Figure 6

The correlation between difference of node sensitivity-boundary and trojan trigger rate. (a) Face recognition model. (b) Age recognition model.
(a)
(b)