Tags

Backdoor attack
Invisibility Cloak
Data Efficiency
Image Captioning