Login / Signup
Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?
Zhengyue Zhao
Jinhao Duan
Kaidi Xu
Chenan Wang
Rui Zhangp Zidong Dup Qi Guo
Xing Hu
Published in:
CoRR (2023)
Keyphrases
</>
personal data
personal information
service providers
privacy preserving
privacy protection
protection mechanisms
third party
identity theft
data collection
data protection
privacy concerns
information systems
data privacy
database
sensitive data
private information
sensitive information
data quality