DeepObfuscator: Adversarial Training Framework for Privacy-Preserving Image Classification
暂无分享,去创建一个
[1] Jianping He,et al. Differential private noise adding mechanism: Basic conditions and its application , 2017, 2017 American Control Conference (ACC).
[2] Andrew Zisserman,et al. Deep Face Recognition , 2015, BMVC.
[3] C. Dwork,et al. Exposed! A Survey of Attacks on Private Data , 2017, Annual Review of Statistics and Its Application.
[4] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[5] Xiaoming Liu,et al. Attribute preserved face de-identification , 2015, 2015 International Conference on Biometrics (ICB).
[6] Andrea Vedaldi,et al. Understanding deep image representations by inverting them , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[7] Zhou Wang,et al. Multiscale structural similarity for image quality assessment , 2003, The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003.
[8] Xiaoxiao Li,et al. Semantic Image Segmentation via Deep Parsing Network , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[9] Thomas Brox,et al. U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.
[10] Xiaogang Wang,et al. Deep Learning Face Attributes in the Wild , 2014, 2015 IEEE International Conference on Computer Vision (ICCV).
[11] Better accuracy with quantified privacy: representations learned via reconstructive adversarial network , 2018, ArXiv.
[12] Yoshua Bengio,et al. Learning Anonymized Representations with Adversarial Neural Networks , 2018, ArXiv.
[13] Jonghyun Choi,et al. Training with the Invisibles: Obfuscating Images to Share Safely for Learning Visual Recognition Models , 2019, ArXiv.
[14] Zhenyu Wu,et al. Towards Privacy-Preserving Visual Recognition via Adversarial Training: A Pilot Study , 2018, ECCV.
[15] Zhou Wang,et al. Group MAD Competition? A New Methodology to Compare Objective Image Quality Models , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[16] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[17] P. Alam,et al. H , 1887, High Explosives, Propellants, Pyrotechnics.
[18] P. Alam. ‘O’ , 2021, Composites Engineering: An A–Z Guide.
[19] Hamed Haddadi,et al. Deep Private-Feature Extraction , 2018, IEEE Transactions on Knowledge and Data Engineering.
[20] Hamed Haddadi,et al. Privacy-Preserving Deep Inference for Rich User Data on The Cloud , 2017, ArXiv.
[21] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[22] P. Alam. ‘A’ , 2021, Composites Engineering: An A–Z Guide.
[23] P. Alam. ‘N’ , 2021, Composites Engineering: An A–Z Guide.
[24] Michael S. Ryoo,et al. Privacy-Preserving Human Activity Recognition from Extreme Low Resolution , 2016, AAAI.