Author of the publication

Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples.

, , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perceptually meaningful quadtree decomposition using dual-homogeneous criteria., , , , and . BMSB, page 1-4. IEEE, (2016)Quality assessment of contrast-altered images., , , , and . ISCAS, page 2214-2217. IEEE, (2016)Perceptual Quality Assessment of Low-light Image Enhancement., , , and . ACM Trans. Multim. Comput. Commun. Appl., 17 (4): 130:1-130:24 (2021)Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching., and . IEEE Trans. Inf. Forensics Secur., 14 (5): 1307-1322 (2019)Scalable Compression of Stream Cipher Encrypted Images Through Context-Adaptive Sampling., , , , and . IEEE Trans. Inf. Forensics Secur., 9 (11): 1857-1868 (2014)Privacy-Preserving Image Denoising From External Cloud Databases., , , and . IEEE Trans. Inf. Forensics Secur., 12 (6): 1285-1298 (2017)Modeling, Design, and Implementation of a Cloud Workflow Engine Based on Aneka., , , , , and . J. Appl. Math., (2014)Error recovery of variable length code over BSC with arbitrary crossover probability., and . IEEE Trans. Commun., 58 (6): 1654-1666 (2010)Scalable coding of stream cipher encrypted images via adaptive sampling., and . ICIP, page 5522-5526. IEEE, (2014)Global quality of assessment and optimization for the backward-compatible stereoscopic display system., , , , and . ICIP, page 191-195. IEEE, (2017)