DataMix: Efficient Privacy-Preserving Edge-Cloud Inference
暂无分享,去创建一个
Song Han | Chuang Gan | Ligeng Zhu | Zhijian Liu | Zhanghao Wu | Song Han | Chuang Gan | Ligeng Zhu | Zhijian Liu | Zhanghao Wu
[1] Li Fei-Fei,et al. Privacy-Preserving Action Recognition for Smart Hospitals using Low-Resolution Depth Images , 2018, ArXiv.
[2] Hamed Haddadi,et al. Deep Private-Feature Extraction , 2018, IEEE Transactions on Knowledge and Data Engineering.
[3] Janusz Konrad,et al. Semi-Coupled Two-Stream Fusion ConvNets for Action Recognition at Extremely Low Resolutions , 2016, 2017 IEEE Winter Conference on Applications of Computer Vision (WACV).
[4] Janusz Konrad,et al. VGAN-Based Image Representation Learning for Privacy-Preserving Facial Expression Recognition , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[5] Vijay S. Iyengar,et al. Transforming data to satisfy privacy constraints , 2002, KDD.
[6] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[7] Quoc V. Le,et al. Self-Training With Noisy Student Improves ImageNet Classification , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[8] Michael S. Ryoo,et al. Privacy-Preserving Human Activity Recognition from Extreme Low Resolution , 2016, AAAI.
[9] Phillip Isola,et al. Contrastive Representation Distillation , 2020, ICLR.
[10] Xiangyu Zhang,et al. ShuffleNet V2: Practical Guidelines for Efficient CNN Architecture Design , 2018, ECCV.
[11] Hamed Haddadi,et al. A Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics , 2017, IEEE Internet of Things Journal.
[12] Shiguang Shan,et al. Heterogeneous Face Attribute Estimation: A Deep Multi-Task Learning Approach , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[13] Song Han,et al. Deep Compression: Compressing Deep Neural Network with Pruning, Trained Quantization and Huffman Coding , 2015, ICLR.
[14] Quoc V. Le,et al. The Evolved Transformer , 2019, ICML.
[15] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[16] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[17] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[18] Zhenyu Wu,et al. Towards Privacy-Preserving Visual Recognition via Adversarial Training: A Pilot Study , 2018, ECCV.
[19] Hongyi Zhang,et al. mixup: Beyond Empirical Risk Minimization , 2017, ICLR.
[20] Seong Joon Oh,et al. Adversarial Image Perturbation for Privacy Protection A Game Theory Perspective , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[21] Michael S. Ryoo,et al. Extreme Low Resolution Activity Recognition with Multi-Siamese Embedding Learning , 2017, AAAI.
[22] Shree K. Nayar,et al. Face swapping: automatically replacing faces in photographs , 2008, SIGGRAPH 2008.
[23] Ralph Gross,et al. Face De-identification , 2009, Protecting Privacy in Video Surveillance.
[24] Xiangyu Zhang,et al. Channel Pruning for Accelerating Very Deep Neural Networks , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[25] Xiangyu Zhang,et al. ShuffleNet: An Extremely Efficient Convolutional Neural Network for Mobile Devices , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[26] Raghuraman Krishnamoorthi,et al. Quantizing deep convolutional networks for efficient inference: A whitepaper , 2018, ArXiv.
[27] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[28] Quoc V. Le,et al. Searching for MobileNetV3 , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[29] Seong Joon Oh,et al. Faceless Person Recognition: Privacy Implications in Social Media , 2016, ECCV.
[30] Tao Li,et al. AnonymousNet: Natural Face De-Identification With Measurable Privacy , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[31] Pete Warden,et al. Speech Commands: A Dataset for Limited-Vocabulary Speech Recognition , 2018, ArXiv.
[32] Philip S. Yu,et al. Not Just Privacy: Improving Performance of Private Deep Learning in Mobile Cloud , 2018, KDD.
[33] Xiaogang Wang,et al. Deep Learning Face Attributes in the Wild , 2014, 2015 IEEE International Conference on Computer Vision (ICCV).
[34] Bo Chen,et al. MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications , 2017, ArXiv.
[35] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[36] Edoardo M. Airoldi,et al. Integrating Utility into Face De-identification , 2005, Privacy Enhancing Technologies.
[37] Andrew Zisserman,et al. Speeding up Convolutional Neural Networks with Low Rank Expansions , 2014, BMVC.
[38] Ralph Gross,et al. Semi-supervised learning of multi-factor models for face de-identification , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[39] Ralph Gross,et al. Model-Based Face De-Identification , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[40] Song Han,et al. Learning both Weights and Connections for Efficient Neural Network , 2015, NIPS.
[41] Zhijian Liu,et al. Lite Transformer with Long-Short Range Attention , 2020, ICLR.
[42] Chuang Gan,et al. TSM: Temporal Shift Module for Efficient Video Understanding , 2018, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[43] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[44] Alexei A. Efros,et al. Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[45] Song Han,et al. Trained Ternary Quantization , 2016, ICLR.
[46] Meng Li,et al. PrivyNet: A Flexible Framework for Privacy-Preserving Deep Neural Network Training with A Fine-Grained Privacy Control , 2017, ArXiv.
[47] Ashwin Machanavajjhala,et al. Protecting Visual Secrets Using Adversarial Nets , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[48] Dan Boneh,et al. Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware , 2018, ICLR.
[49] Mark Sandler,et al. MobileNetV2: Inverted Residuals and Linear Bottlenecks , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[50] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[51] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[52] Bradley Malin,et al. Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.
[53] Yong Jae Lee,et al. Learning to Anonymize Faces for Privacy Preserving Action Detection , 2018, ECCV.
[54] Jonghyun Choi,et al. Training with the Invisibles: Obfuscating Images to Share Safely for Learning Visual Recognition Models , 2019, ArXiv.
[55] Xiaoming Liu,et al. Attribute preserved face de-identification , 2015, 2015 International Conference on Biometrics (ICB).
[56] Kurt Keutzer,et al. SqueezeNext: Hardware-Aware Neural Network Design , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[57] Tim Verbelen,et al. Privacy Aware Offloading of Deep Neural Networks , 2018, ICML 2018.
[58] Ran El-Yaniv,et al. Binarized Neural Networks , 2016, NIPS.
[59] Forrest N. Iandola,et al. SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and <1MB model size , 2016, ArXiv.
[60] Song Han,et al. AMC: AutoML for Model Compression and Acceleration on Mobile Devices , 2018, ECCV.
[61] Zhijian Liu,et al. HAQ: Hardware-Aware Automated Quantization With Mixed Precision , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[62] Zhiqiang Shen,et al. Learning Efficient Convolutional Networks through Network Slimming , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).