Login / Signup

Protecting Sensitive Attributes by Adversarial Training Through Class-Overlapping Techniques.

Tsung-Hsien LinYing-Shuo LeeFu-Chieh ChangJ. Morris ChangPei-Yuan Wu
Published in: IEEE Trans. Inf. Forensics Secur. (2023)
Keyphrases
  • training examples
  • database
  • databases
  • social networks
  • training set
  • supervised learning
  • input data
  • data collection
  • access control