Semi-adversarial Networks: Convolutional Autoencoders for Imparting Privacy to Face Images
暂无分享,去创建一个
Arun Ross | Anoop M. Namboodiri | Vahid Mirjalili | Sebastian Raschka | A. Ross | A. Namboodiri | S. Raschka | Vahid Mirjalili
[1] Ralph Gross,et al. Model-Based Face De-Identification , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[2] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[3] Marwan Mattar,et al. Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .
[4] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[5] Tieniu Tan,et al. Demographic Analysis from Biometric Data: Achievements, Challenges, and New Frontiers , 2018, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Arun Ross,et al. Privacy of Facial Soft Biometrics: Suppressing Gender But Retaining Identity , 2014, ECCV Workshops.
[7] Wen Gao,et al. High-Resolution Face Fusion for Gender Conversion , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[8] Arun Ross,et al. Soft biometric privacy: Retaining biometric utility of face images while perturbing gender , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).
[9] Andrew Zisserman,et al. Deep Face Recognition , 2015, BMVC.
[10] Arun Ross,et al. An introduction to biometrics , 2008, ICPR 2008.
[11] Sebastian Raschka,et al. Python Machine Learning , 2015 .
[12] Els J. Kindt,et al. Privacy and Data Protection Issues of Biometric Applications , 2013 .
[13] Arun Ross,et al. What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics , 2016, IEEE Transactions on Information Forensics and Security.
[14] Edoardo M. Airoldi,et al. Integrating Utility into Face De-identification , 2005, Privacy Enhancing Technologies.
[15] Xiaoming Liu,et al. Attribute preserved face de-identification , 2015, 2015 International Conference on Biometrics (ICB).
[16] Li Zhang,et al. Controllable Face Privacy , 2015, 2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG).
[17] Yong Xiang,et al. Protection of Privacy in Biometric Data , 2016, IEEE Access.
[18] Duncan Rowland,et al. Manipulating facial appearance through shape and color , 1995, IEEE Computer Graphics and Applications.
[19] David A. McAllester,et al. Cascade object detection with deformable part models , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[20] Aleix M. Martinez,et al. The AR face database , 1998 .
[21] Martín Abadi,et al. TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems , 2016, ArXiv.
[22] Stephen Milborrow. The MUCT Landmarked Face Database , 2010 .
[23] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[24] Geoffrey E. Hinton,et al. Reducing the Dimensionality of Data with Neural Networks , 2006, Science.
[25] Xiaogang Wang,et al. Deep Learning Face Attributes in the Wild , 2014, 2015 IEEE International Conference on Computer Vision (ICCV).
[26] Terrance E. Boult,et al. Are facial attributes adversarially robust? , 2016, 2016 23rd International Conference on Pattern Recognition (ICPR).
[27] Bradley Malin,et al. Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.