Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
When machine learning meets privacy: A survey and outlook
The newly emerged machine learning (eg, deep learning) methods have become a strong
driving force to revolutionize a wide range of industries, such as smart healthcare, financial …
driving force to revolutionize a wide range of industries, such as smart healthcare, financial …
Camera measurement of physiological vital signs
D McDuff - ACM Computing Surveys, 2023 - dl.acm.org
The need for remote tools for healthcare monitoring has never been more apparent. Camera
measurement of vital signs leverages imaging devices to compute physiological changes by …
measurement of vital signs leverages imaging devices to compute physiological changes by …
Deeptest: Automated testing of deep-neural-network-driven autonomous cars
Recent advances in Deep Neural Networks (DNNs) have led to the development of DNN-
driven autonomous cars that, using sensors like camera, LiDAR, etc., can drive without any …
driven autonomous cars that, using sensors like camera, LiDAR, etc., can drive without any …
Defeating image obfuscation with deep learning
We demonstrate that modern image recognition methods based on artificial neural networks
can recover hidden information from images protected by various forms of obfuscation. The …
can recover hidden information from images protected by various forms of obfuscation. The …
Does image anonymization impact computer vision training?
Image anonymization is widely adapted in practice to comply with privacy regulations in
many regions. However, anonymization often degrades the quality of the data, reducing its …
many regions. However, anonymization often degrades the quality of the data, reducing its …
Towards a visual privacy advisor: Understanding and predicting privacy risks in images
With an increasing number of users sharing information online, privacy implications entailing
such actions are a major concern. For explicit content, such as user profile or GPS data …
such actions are a major concern. For explicit content, such as user profile or GPS data …
Towards face encryption by generating adversarial identity masks
As billions of personal data being shared through social media and network, the data
privacy and security have drawn an increasing attention. Several attempts have been made …
privacy and security have drawn an increasing attention. Several attempts have been made …
Adversarial image perturbation for privacy protection a game theory perspective
Users like sharing personal photos with others through social media. At the same time, they
might want to make automatic identification in such photos difficult or even impossible …
might want to make automatic identification in such photos difficult or even impossible …
Privacy-preserving brain–computer interfaces: A systematic review
A brain–computer interface (BCI) establishes a direct communication pathway between the
human brain and a computer. It has been widely used in medical diagnosis, rehabilitation …
human brain and a computer. It has been widely used in medical diagnosis, rehabilitation …
Towards practical verification of machine learning: The case of computer vision systems
Due to the increasing usage of machine learning (ML) techniques in security-and safety-
critical domains, such as autonomous systems and medical diagnosis, ensuring correct …
critical domains, such as autonomous systems and medical diagnosis, ensuring correct …