Tags

Backdoor Attack
Invisibility Cloak
Data Efficiency
Image Captioning