Open zuiluorenjian opened 1 month ago
Hello,
We utilized EfficientNet-B4 as the backbone for backdoor attack experiments on SBI, following the original SBI implementation. Additionally, please ensure that all settings, such as batch size and the number of images extracted from videos, adhere to our guidelines.
We consider uploading baseline implementations to our repository at a later time. Alternatively, you can access various backdoor baseline implementations at BackdoorBench.
OK ,Thank you very much
Hello author, I have two small problems when reproducing. First, I see that there is an efficientnet-b4 detector in your source code, but your paper does not adopt this. I would like to ask why. When I implemented it, the effect did not seem to be very good. Second, regarding your comparison with other attack methods, I don’t see that it is reflected in the source code. I don’t know how the indicators are obtained. I may have more problems during the novice period. I am very sorry.