• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4695755)   Today's Articles (19)
For: Mirjalili V, Raschka S, Ross A. PrivacyNet: Semi-Adversarial Networks for Multi-attribute Face Privacy. IEEE Trans Image Process 2020;PP:9400-9412. [PMID: 32956058 DOI: 10.1109/tip.2020.3024026] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Number Cited by Other Article(s)
1
Zhao R, Zhang Y, Lan R, Yi S, Hua Z, Weng J. All Roads Lead to Rome: Achieving 3D Object Encryption Through 2D Image Encryption Methods. IEEE TRANSACTIONS ON IMAGE PROCESSING : A PUBLICATION OF THE IEEE SIGNAL PROCESSING SOCIETY 2025;34:1075-1089. [PMID: 40031730 DOI: 10.1109/tip.2025.3536219] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 03/05/2025]
2
Xie T, Han H, Shan S, Chen X. Natural Adversarial Mask for Face Identity Protection in Physical World. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 2024;PP:2089-2106. [PMID: 40030813 DOI: 10.1109/tpami.2024.3522994] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 03/05/2025]
3
Xie Y, Zhou Y, Wang T, Wen W, Yi S, Zhang Y. Reversible gender privacy enhancement via adversarial perturbations. Neural Netw 2024;172:106130. [PMID: 38242010 DOI: 10.1016/j.neunet.2024.106130] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/11/2023] [Revised: 11/28/2023] [Accepted: 01/12/2024] [Indexed: 01/21/2024]
4
Pernus M, Struc V, Dobrisek S. MaskFaceGAN: High-Resolution Face Editing With Masked GAN Latent Code Optimization. IEEE TRANSACTIONS ON IMAGE PROCESSING : A PUBLICATION OF THE IEEE SIGNAL PROCESSING SOCIETY 2023;32:5893-5908. [PMID: 37889810 DOI: 10.1109/tip.2023.3326675] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/29/2023]
5
Zhang J, Zhang W, Xu J. StegEdge: Privacy protection of unknown sensitive attributes in edge intelligence via deception. JOURNAL OF COMPUTER SECURITY 2022. [DOI: 10.3233/jcs-220042] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
6
Fairness and Privacy Preservation for Facial Images: GAN-based Methods. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102902] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
7
Chen HY, Huang SH. Generating a trading strategy in the financial market from sensitive expert data based on the privacy-preserving generative adversarial imitation network. Neurocomputing 2022. [DOI: 10.1016/j.neucom.2022.05.039] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
8
Rezgui Z, Bassit A, Veldhuis R. Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation. IET BIOMETRICS 2022. [DOI: 10.1049/bme2.12082] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]  Open
9
Dual attention granularity network for vehicle re-identification. Neural Comput Appl 2021. [DOI: 10.1007/s00521-021-06559-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
10
Scaling & fuzzing: Personal image privacy from automated attacks in mobile cloud computing. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2021. [DOI: 10.1016/j.jisa.2021.102850] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
11
Raschka S, Kaufman B. Machine learning and AI-based approaches for bioactive ligand discovery and GPCR-ligand recognition. Methods 2020;180:89-110. [PMID: 32645448 PMCID: PMC8457393 DOI: 10.1016/j.ymeth.2020.06.016] [Citation(s) in RCA: 35] [Impact Index Per Article: 7.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/17/2020] [Revised: 06/23/2020] [Accepted: 06/23/2020] [Indexed: 02/06/2023]  Open
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA