Trojan Attack

Topological Detection of Trojaned Neural Networks