Login / Signup
Protecting by attacking: A personal information protecting method with cross-modal adversarial examples.
Mengnan Zhao
Bo Wang
Weikuo Guo
Wei Wang
Published in:
Neurocomputing (2023)
Keyphrases
</>
personal information
similarity measure
object recognition
third party
multimedia
high level
image sequences
feature extraction
data sources
training examples
cross modal