Sign in

Access Control with Encrypted Feature Maps for Object Detection Models.

Teru NagamoriHiroki ItoAprilPyone MaungMaungHitoshi Kiya
Published in: CoRR (2022)
Keyphrases
  • access control
  • object detection
  • access control models
  • feature maps
  • data security
  • dynamic access control
  • security policies
  • machine learning
  • database security
  • computer vision
  • role based access control