[1]
R. Ning, J. Li, C. Xin, H. Wu, and C. Wang, “Hibernated Backdoor: A Mutual Information Empowered Backdoor Attack to Deep Neural Networks”, AAAI, vol. 36, no. 9, pp. 10309-10318, Jun. 2022.