Stealthy Backdoors as Compression ArtifactsYulong Tian, Fnu Suya, Fengyuan Xu, David EvansLast updated on Nov 27, 2023PDF Cite Codebackdoor attacks model compression pretrained model manipulationFnu SuyaAssistant ProfessorMy research interests include machine learning for security and trustworthy machine learning.