Advanced image tampering techniques are increasingly challenging the
tru...
Routing strategies for traffics and vehicles have been historically stud...
To date, the privacy-protection intended pixelation tasks are still
labo...
A larger portion of fake news quotes untampered images from other source...
With the prevailing of live video streaming, establishing an online
pixe...
With similarity-based content delivery, the request for a content can be...
This paper introduces an algorithm to protect the privacy of individuals...
Face pixelation in TV shows or videos is manually realized and not well
...
Deep Neural Networks have achieved remarkable success in computer vision...
Deep Neural Models are vulnerable to adversarial perturbations in
classi...