Author:
Abedi Khorasgani Hossein,Mohammed Noman,Wang Yang
Publisher
Springer Science and Business Media LLC
Reference54 articles.
1. Abadi, M., Chu, A., Goodfellow, I., McMahan, H.B, Mironov, I., Talwar, K., Zhang, L.: Deep learning with differential privacy. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), (2016). https://doi.org/10.1145/2976749.2978318
2. Bahng, H., Jahanian, A., Sankaranarayanan, S., Isola, P.: Exploring visual prompts for adapting large-scale models. arXiv:abs/2203.17274 (2022)
3. Chang, J., Sha, J.: An efficient implementation of 2D convolution in CNN. IEICE Electron. Express (2017). https://doi.org/10.1587/elex.13.20161134
4. Chen, P.-Y.: Model reprogramming: resource-efficient cross-domain machine learning. arXiv:abs/2202.10629 (2022)
5. Dave, I.R., Chen, C., Shah, M.: SPAct: self-supervised privacy preservation for action recognition. In: CVPR. https://doi.org/10.1109/CVPR52688.2022.01953 (2022)