Login / Signup

Protecting by attacking: A personal information protecting method with cross-modal adversarial examples.

Mengnan ZhaoBo WangWeikuo GuoWei Wang
Published in: Neurocomputing (2023)
Keyphrases
  • personal information
  • similarity measure
  • object recognition
  • third party
  • multimedia
  • high level
  • image sequences
  • feature extraction
  • data sources
  • training examples
  • cross modal