Cited By
View all- Liu XZhong YCui XZhang YLi PDeng W(2025)AdvCloak: Customized adversarial cloak for privacy protectionPattern Recognition10.1016/j.patcog.2024.111050158(111050)Online publication date: Feb-2025
- Yang ZZhang YWang THua ZXia ZWeng JCai JKankanhalli MPrabhakaran BBoll SSubramanian RZheng LSingh VCesar PXie LXu D(2024)Once-for-all: Efficient Visual Face Privacy Protection via Person-specific VeilsProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3681371(7705-7713)Online publication date: 28-Oct-2024
- Chai XCao GGan ZZhang YMa YHe X(2024)TPE-AP: Thumbnail-Preserving Encryption Based on Adjustable Precision for JPEG ImagesIEEE Internet of Things Journal10.1109/JIOT.2024.343954911:22(37021-37031)Online publication date: 15-Nov-2024
- Show More Cited By