Login / Signup
Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth.
Yujia Liu
Weiming Zhang
Nenghai Yu
Published in:
Secur. Commun. Networks (2017)
Keyphrases
</>
privacy preservation
privacy issues
data mining
private information
privacy preserving
privacy preserving data mining
legal issues
inference control
database
multi agent
visual features
image content
personal information
personal data
identity management