A survey on differential privacy for unstructured data content

Y Zhao, J Chen - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Huge amounts of unstructured data including image, video, audio, and text are ubiquitously
generated and shared, and it is a challenge to protect sensitive personal information in …

When machine learning meets privacy: A survey and outlook

B Liu, M Ding, S Shaham, W Rahayu… - ACM Computing …, 2021 - dl.acm.org
The newly emerged machine learning (eg, deep learning) methods have become a strong
driving force to revolutionize a wide range of industries, such as smart healthcare, financial …

Deep learning for image inpainting: A survey

H Xiang, Q Zou, MA Nawaz, X Huang, F Zhang, H Yu - Pattern Recognition, 2023 - Elsevier
Image inpainting has been widely exploited in the field of computer vision and image
processing. The main purpose of image inpainting is to produce visually plausible structure …

Deepfakes and beyond: A survey of face manipulation and fake detection

R Tolosana, R Vera-Rodriguez, J Fierrez, A Morales… - Information …, 2020 - Elsevier
The free access to large-scale public databases, together with the fast progress of deep
learning techniques, in particular Generative Adversarial Networks, have led to the …

Celeb-df: A large-scale challenging dataset for deepfake forensics

Y Li, X Yang, P Sun, H Qi, S Lyu - Proceedings of the IEEE …, 2020 - openaccess.thecvf.com
AI-synthesized face-swapping videos, commonly known as DeepFakes, is an emerging
problem threatening the trustworthiness of online information. The need to develop and …

Meta-transfer learning for few-shot learning

Q Sun, Y Liu, TS Chua… - Proceedings of the IEEE …, 2019 - openaccess.thecvf.com
Meta-learning has been proposed as a framework to address the challenging few-shot
learning setting. The key idea is to leverage a large number of similar few-shot tasks in order …

Knockoff nets: Stealing functionality of black-box models

T Orekondy, B Schiele, M Fritz - Proceedings of the IEEE …, 2019 - openaccess.thecvf.com
Abstract Machine Learning (ML) models are increasingly deployed in the wild to perform a
wide range of tasks. In this work, we ask to what extent can an adversary steal functionality …

A study of face obfuscation in imagenet

K Yang, JH Yau, L Fei-Fei, J Deng… - International …, 2022 - proceedings.mlr.press
Face obfuscation (blurring, mosaicing, etc.) has been shown to be effective for privacy
protection; nevertheless, object recognition research typically assumes access to complete …

Fawkes: Protecting privacy against unauthorized deep learning models

S Shan, E Wenger, J Zhang, H Li, H Zheng… - 29th USENIX security …, 2020 - usenix.org
Today's proliferation of powerful facial recognition systems poses a real threat to personal
privacy. As Clearview. ai demonstrated, anyone can canvas the Internet for data and train …

Disentangled person image generation

L Ma, Q Sun, S Georgoulis… - Proceedings of the …, 2018 - openaccess.thecvf.com
Generating novel, yet realistic, images of persons is a challenging task due to the complex
interplay between the different image factors, such as the foreground, background and pose …