Login / Signup
Protecting Sensitive Attributes by Adversarial Training Through Class-Overlapping Techniques.
Tsung-Hsien Lin
Ying-Shuo Lee
Fu-Chieh Chang
J. Morris Chang
Pei-Yuan Wu
Published in:
IEEE Trans. Inf. Forensics Secur. (2023)
Keyphrases
</>
training examples
database
databases
social networks
training set
supervised learning
input data
data collection
access control