You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I've been reproducing the results in the paper with this code a lot. However, the attack does not seem to work at all with the poisons that I stored from the following run (as the paper recommends):
This command will store three files base_indices.picklepoisons.pickle and source.pickle, and when I load them into the poisoning-benchmark written by Avi et al., the success rate of this backdoor attack is ~0.5%. Other poisoning attacks like Witches-brew and Bullseye-polytope work as expected.
Perhaps, this attack only works in a specific setup in the source code? or are there any specific ways we should do to make the attack compatible with the poisoning benchmarks?
The text was updated successfully, but these errors were encountered:
I've been reproducing the results in the paper with this code a lot. However, the attack does not seem to work
at all
with the poisons that I stored from the following run (as the paper recommends):This command will store three files
base_indices.pickle
poisons.pickle
andsource.pickle
, and when I load them into the poisoning-benchmark written by Avi et al., the success rate of this backdoor attack is ~0.5%. Other poisoning attacks like Witches-brew and Bullseye-polytope work as expected.Perhaps, this attack only works in a specific setup in the source code? or are there any specific ways we should do to make the attack compatible with the poisoning benchmarks?
The text was updated successfully, but these errors were encountered: