Research Article

Task-Oriented Network Abnormal Behavior Detection Method

Figure 13

Flowchart of the simulated backdoor attack.