Author:
Wu Yifan,Yang Fan,Xu Yong,Ling Haibin
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Science Applications,Hardware and Architecture,Theoretical Computer Science,Software
Reference40 articles.
1. Newton E M, Sweeney L, Malin B. Preserving privacy by de-identifying face images. IEEE Transactions on Knowledge and Data Engineering, 2005, 17(2): 232-243.
2. Ribaric S, Ariyaeeinia A, Pavesic N. De-identification for privacy protection in multimedia content: A survey. Signal Processing: Image Communication, 2016, 47: 131-151.
3. Gross R, Airoldi E, Malin B, Sweeney L. Integrating utility into face de-identification. In Proc. the 5th International Conference on Privacy Enhancing Technologies, May 2005, pp.227-242.
4. Gross R, Sweeney L, de la Torre F, Baker S. Model-based face de-identification. In Proc. the 2006 Conference on Computer Vision and Pattern Recognition, Jun. 2006, Article No. 161.
5. Gross R, Sweeney L, de La Torre F, Baker S. Semisupervised learning of multi-factor models for face deidentification. In Proc. the 2008 Conference on Computer Vision and Pattern Recognition, Jun. 2008, Article No. 10.
Cited by
90 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献