Login / Signup
Turning backdoors for efficient privacy protection against image retrieval violations.
Qiang Liu
Tongqing Zhou
Zhiping Cai
Yuan Yuan
Ming Xu
Jiaohua Qin
Wentao Ma
Published in:
Inf. Process. Manag. (2023)
Keyphrases
</>
image retrieval
image representation
privacy preserving
cost effective
retrieval method
computationally efficient
information security
content based retrieval