Destruction-Restoration Suppresses Data Protection Perturbations against Diffusion Models.
Tianrui QinXitong GaoJuanjuan ZhaoKejiang YePublished in: ICTAI (2023)
Keyphrases
- data protection
- diffusion models
- diffusion model
- information diffusion
- access control
- social networks
- data security
- privacy protection
- influence maximization
- sensitive information
- personal data
- information security
- viral marketing
- data privacy
- greedy algorithm
- data integrity
- sensitive data
- diffusion process
- image processing
- e government
- multiscale
- data collection
- data sets