Author of the publication

Disguise without Disruption: Utility-Preserving Face De-identification.

, , , , , , and . AAAI, page 918-926. AAAI Press, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximation strategy based on the T-product for third-order quaternion tensors with application to color video compression., and . Appl. Math. Lett., (June 2023)A Note on the Nonemptiness and Compactness of Solution Sets of Weakly Homogeneous Variational Inequalities., , and . SIAM J. Optim., 30 (1): 132-148 (2020)Nonemptiness and Compactness of Solution Sets to Generalized Polynomial Complementarity Problems., , and . J. Optim. Theory Appl., 185 (1): 80-98 (2020)Unconstrained minimization of block-circulant polynomials via semidefinite program in third-order tensor space., , and . J. Glob. Optim., 84 (2): 415-440 (2022)T-positive semidefiniteness of third-order symmetric tensors and T-semidefinite programming., , and . Comput. Optim. Appl., 78 (1): 239-272 (2021)Unique solvability of weakly homogeneous generalized variational inequalities., , and . J. Glob. Optim., 80 (4): 921-943 (2021)Nonemptiness and Compactness of Solution Sets to Weakly Homogeneous Generalized Variational Inequalities., , and . J. Optim. Theory Appl., 189 (3): 919-937 (2021)A fast scheme for arbitrarily resizing of digital image in the compressed domain., , and . IEEE Trans. Consumer Electronics, 49 (2): 466-471 (2003)Transmission Scheduling With Order Constraints in WIA-FA-Based AGV Systems., , , , , and . IEEE Internet Things J., 8 (1): 381-392 (2021)GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids., , , and . IEEE Trans. Netw. Sci. Eng., 7 (2): 805-816 (2020)