ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1703.09471
  4. Cited By
Adversarial Image Perturbation for Privacy Protection -- A Game Theory
  Perspective

Adversarial Image Perturbation for Privacy Protection -- A Game Theory Perspective

28 March 2017
Seong Joon Oh
Mario Fritz
Bernt Schiele
    CVBM
    AAML
ArXivPDFHTML

Papers citing "Adversarial Image Perturbation for Privacy Protection -- A Game Theory Perspective"

50 / 81 papers shown
Title
DP-TRAE: A Dual-Phase Merging Transferable Reversible Adversarial Example for Image Privacy Protection
DP-TRAE: A Dual-Phase Merging Transferable Reversible Adversarial Example for Image Privacy Protection
Xia Du
Jiajie Zhu
Jizhe Zhou
Chi-Man Pun
Zheng Lin
Cong Wu
Zhaoyu Chen
Jun Luo
AAML
26
0
0
11 May 2025
Diffusion-based Adversarial Identity Manipulation for Facial Privacy Protection
Diffusion-based Adversarial Identity Manipulation for Facial Privacy Protection
Liqin Wang
Qianyue Hu
Wei Lu
Xiangyang Luo
DiffM
AAML
PICV
72
0
0
30 Apr 2025
Learning Robust and Privacy-Preserving Representations via Information
  Theory
Learning Robust and Privacy-Preserving Representations via Information Theory
Binghui Zhang
Sayedeh Leila Noorbakhsh
Yun Dong
Yuan Hong
Binghui Wang
64
0
0
15 Dec 2024
Face De-identification: State-of-the-art Methods and Comparative Studies
Face De-identification: State-of-the-art Methods and Comparative Studies
Jingyi Cao
Xiangyi Chen
Bo Liu
Ming Ding
Rong Xie
Li-Na Song
Zhu Li
Wenjun Zhang
PICV
57
2
0
15 Nov 2024
Makeup-Guided Facial Privacy Protection via Untrained Neural Network
  Priors
Makeup-Guided Facial Privacy Protection via Untrained Neural Network Priors
Fahad Shamshad
Muzammal Naseer
Karthik Nandakumar
AAML
PICV
36
1
0
20 Aug 2024
PrivateGaze: Preserving User Privacy in Black-box Mobile Gaze Tracking
  Services
PrivateGaze: Preserving User Privacy in Black-box Mobile Gaze Tracking Services
Chu Qiao
Cong Wang
Zhenkai Zhang
Guohao Lan
PICV
44
1
0
01 Aug 2024
Transferable Adversarial Facial Images for Privacy Protection
Transferable Adversarial Facial Images for Privacy Protection
Minghui Li
Jiangxiong Wang
Hao Zhang
Ziqi Zhou
Sheng-shou Hu
Xiaobing Pei
PICV
AAML
46
8
0
18 Jul 2024
Mitigating Low-Frequency Bias: Feature Recalibration and Frequency Attention Regularization for Adversarial Robustness
Mitigating Low-Frequency Bias: Feature Recalibration and Frequency Attention Regularization for Adversarial Robustness
Kejia Zhang
Juanjuan Weng
Yuanzheng Cai
Zhiming Luo
Shaozi Li
AAML
64
0
0
04 Jul 2024
Mask-up: Investigating Biases in Face Re-identification for Masked Faces
Mask-up: Investigating Biases in Face Re-identification for Masked Faces
Siddharth D. Jaiswal
Ankit Kr. Verma
Animesh Mukherjee
23
0
0
21 Feb 2024
Enhancing targeted transferability via feature space fine-tuning
Enhancing targeted transferability via feature space fine-tuning
Hui Zeng
Biwei Chen
Anjie Peng
AAML
34
3
0
05 Jan 2024
Task-Agnostic Privacy-Preserving Representation Learning for Federated
  Learning Against Attribute Inference Attacks
Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning Against Attribute Inference Attacks
Caridad Arroyo Arevalo
Sayedeh Leila Noorbakhsh
Yun Dong
Yuan Hong
Binghui Wang
55
13
0
12 Dec 2023
Roulette: A Semantic Privacy-Preserving Device-Edge Collaborative
  Inference Framework for Deep Learning Classification Tasks
Roulette: A Semantic Privacy-Preserving Device-Edge Collaborative Inference Framework for Deep Learning Classification Tasks
Jingyi Li
Guocheng Liao
Lin Chen
Xu Chen
34
8
0
06 Sep 2023
PRO-Face S: Privacy-preserving Reversible Obfuscation of Face Images via
  Secure Flow
PRO-Face S: Privacy-preserving Reversible Obfuscation of Face Images via Secure Flow
Lin Yuan
Kai Liang
Xiao Pu
Yan Zhang
Jiaxu Leng
Tao Wu
Nannan Wang
Xinbo Gao
PICV
26
1
0
18 Jul 2023
CLIP2Protect: Protecting Facial Privacy using Text-Guided Makeup via
  Adversarial Latent Search
CLIP2Protect: Protecting Facial Privacy using Text-Guided Makeup via Adversarial Latent Search
Fahad Shamshad
Muzammal Naseer
Karthik Nandakumar
AAML
PICV
36
27
0
16 Jun 2023
Does Image Anonymization Impact Computer Vision Training?
Does Image Anonymization Impact Computer Vision Training?
Håkon Hukkelås
Frank Lindseth
PICV
CVBM
27
18
0
08 Jun 2023
Adversary for Social Good: Leveraging Adversarial Attacks to Protect
  Personal Attribute Privacy
Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy
Xiaoting Li
Ling-Hao Chen
Dinghao Wu
AAML
SILM
19
6
0
04 Jun 2023
The Best Defense is a Good Offense: Adversarial Augmentation against
  Adversarial Attacks
The Best Defense is a Good Offense: Adversarial Augmentation against Adversarial Attacks
I. Frosio
Jan Kautz
AAML
29
15
0
23 May 2023
Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by
  Model Quantization
Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantization
Yulong Yang
Chenhao Lin
Qian Li
Zhengyu Zhao
Haoran Fan
Dawei Zhou
Nannan Wang
Tongliang Liu
Chao Shen
AAML
MQ
32
12
0
10 May 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the
  Life-cycle Perspective
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
44
21
0
19 Feb 2023
Image Shortcut Squeezing: Countering Perturbative Availability Poisons
  with Compression
Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression
Zhuoran Liu
Zhengyu Zhao
Martha Larson
32
34
0
31 Jan 2023
StyleGAN as a Utility-Preserving Face De-identification Method
StyleGAN as a Utility-Preserving Face De-identification Method
Seyyed Mohammad Sadegh Moosavi Khorzooghi
Shirin Nilizadeh
PICV
CVBM
43
4
0
05 Dec 2022
My Face My Choice: Privacy Enhancing Deepfakes for Social Media
  Anonymization
My Face My Choice: Privacy Enhancing Deepfakes for Social Media Anonymization
U. Ciftci
Gokturk Yuksek
Ilke Demir
PICV
CVBM
18
17
0
02 Nov 2022
Learning Location from Shared Elevation Profiles in Fitness Apps: A
  Privacy Perspective
Learning Location from Shared Elevation Profiles in Fitness Apps: A Privacy Perspective
Ulku Meteriz-Yildiran
Necip Fazil Yildiran
Joongheon Kim
David A. Mohaisen
21
3
0
27 Oct 2022
Hiding Visual Information via Obfuscating Adversarial Perturbations
Hiding Visual Information via Obfuscating Adversarial Perturbations
Zhigang Su
Dawei Zhou
Nannan Wangu
Decheng Liu
Zhen Wang
Xinbo Gao
AAML
16
9
0
30 Sep 2022
Sanitization of Visual Multimedia Content: A Survey of Techniques,
  Attacks, and Future Directions
Sanitization of Visual Multimedia Content: A Survey of Techniques, Attacks, and Future Directions
Hanaa Abbas
Roberto Di Pietro
24
2
0
05 Jul 2022
OPOM: Customized Invisible Cloak towards Face Privacy Protection
OPOM: Customized Invisible Cloak towards Face Privacy Protection
Yaoyao Zhong
Weihong Deng
PICV
38
32
0
24 May 2022
WaveFuzz: A Clean-Label Poisoning Attack to Protect Your Voice
WaveFuzz: A Clean-Label Poisoning Attack to Protect Your Voice
Yunjie Ge
Qianqian Wang
Jingfeng Zhang
Juntao Zhou
Yunzhu Zhang
Chao Shen
AAML
20
6
0
25 Mar 2022
DRAG: Dynamic Region-Aware GCN for Privacy-Leaking Image Detection
DRAG: Dynamic Region-Aware GCN for Privacy-Leaking Image Detection
Guang Yang
Juan Cao
Qiang Sheng
Peng Qi
Xirong Li
Jintao Li
28
13
0
17 Mar 2022
GMFIM: A Generative Mask-guided Facial Image Manipulation Model for
  Privacy Preservation
GMFIM: A Generative Mask-guided Facial Image Manipulation Model for Privacy Preservation
Mohammad Hossein Khojaste
Nastaran Moradzadeh Farid
A. Nickabadi
CVBM
PICV
15
8
0
10 Jan 2022
Preemptive Image Robustification for Protecting Users against
  Man-in-the-Middle Adversarial Attacks
Preemptive Image Robustification for Protecting Users against Man-in-the-Middle Adversarial Attacks
Seungyong Moon
Gaon An
Hyun Oh Song
AAML
14
5
0
10 Dec 2021
Going Grayscale: The Road to Understanding and Improving Unlearnable
  Examples
Going Grayscale: The Road to Understanding and Improving Unlearnable Examples
Zhuoran Liu
Zhengyu Zhao
A. Kolmus
Tijn Berns
Twan van Laarhoven
Tom Heskes
Martha Larson
AAML
39
6
0
25 Nov 2021
Two-Face: Adversarial Audit of Commercial Face Recognition Systems
Two-Face: Adversarial Audit of Commercial Face Recognition Systems
S. Jaiswal
K. Duggirala
A. Dash
Animesh Mukherjee
MLAU
AAML
36
10
0
17 Nov 2021
Get a Model! Model Hijacking Attack Against Machine Learning Models
Get a Model! Model Hijacking Attack Against Machine Learning Models
A. Salem
Michael Backes
Yang Zhang
AAML
15
28
0
08 Nov 2021
Deep Learning Approach Protecting Privacy in Camera-Based Critical
  Applications
Deep Learning Approach Protecting Privacy in Camera-Based Critical Applications
Gautham Ramajayam
Tao Sun
C. C. Tan
Lannan Luo
Haibin Ling
19
0
0
04 Oct 2021
Data Poisoning Won't Save You From Facial Recognition
Data Poisoning Won't Save You From Facial Recognition
Evani Radiya-Dixit
Sanghyun Hong
Nicholas Carlini
Florian Tramèr
AAML
PICV
15
57
0
28 Jun 2021
DP-Image: Differential Privacy for Image Data in Feature Space
DP-Image: Differential Privacy for Image Data in Feature Space
Hanyu Xue
Bo Liu
Ming Ding
Tianqing Zhu
Dayong Ye
Li-Na Song
Wanlei Zhou
15
33
0
12 Mar 2021
A Study of Face Obfuscation in ImageNet
A Study of Face Obfuscation in ImageNet
Kaiyu Yang
Jacqueline Yau
Li Fei-Fei
Jia Deng
Olga Russakovsky
PICV
CVBM
30
144
0
10 Mar 2021
IdentityDP: Differential Private Identification Protection for Face
  Images
IdentityDP: Differential Private Identification Protection for Face Images
Yunqian Wen
Li-Na Song
Bo Liu
Ming Ding
Rong Xie
PICV
38
62
0
02 Mar 2021
On Success and Simplicity: A Second Look at Transferable Targeted
  Attacks
On Success and Simplicity: A Second Look at Transferable Targeted Attacks
Zhengyu Zhao
Zhuoran Liu
Martha Larson
AAML
35
122
0
21 Dec 2020
FoggySight: A Scheme for Facial Lookup Privacy
FoggySight: A Scheme for Facial Lookup Privacy
Ivan Evtimov
Pascal Sturmfels
Tadayoshi Kohno
PICV
FedML
15
24
0
15 Dec 2020
When Machine Learning Meets Privacy: A Survey and Outlook
When Machine Learning Meets Privacy: A Survey and Outlook
B. Liu
Ming Ding
Sina shaham
W. Rahayu
F. Farokhi
Zihuai Lin
10
281
0
24 Nov 2020
Amadeus: Scalable, Privacy-Preserving Live Video Analytics
Amadeus: Scalable, Privacy-Preserving Live Video Analytics
Sandeep M. D'Souza
P. Bahl
Lixiang Ao
Landon P. Cox
14
8
0
06 Nov 2020
Privacy Intelligence: A Survey on Image Privacy in Online Social
  Networks
Privacy Intelligence: A Survey on Image Privacy in Online Social Networks
Chi Liu
Tianqing Zhu
Jun Zhang
Wanlei Zhou
PICV
13
30
0
27 Aug 2020
Uncovering the Connections Between Adversarial Transferability and
  Knowledge Transferability
Uncovering the Connections Between Adversarial Transferability and Knowledge Transferability
Kaizhao Liang
Jacky Y. Zhang
Wei Ping
Zhuolin Yang
Oluwasanmi Koyejo
Yangqiu Song
AAML
33
25
0
25 Jun 2020
Adversarial representation learning for synthetic replacement of private
  attributes
Adversarial representation learning for synthetic replacement of private attributes
John Martinsson
Edvin Listo Zec
D. Gillblad
Olof Mogren
PICV
6
8
0
14 Jun 2020
Privacy Adversarial Network: Representation Learning for Mobile Data
  Privacy
Privacy Adversarial Network: Representation Learning for Mobile Data Privacy
Sicong Liu
Junzhao Du
Anshumali Shrivastava
Lin Zhong
36
14
0
08 Jun 2020
TIPRDC: Task-Independent Privacy-Respecting Data Crowdsourcing Framework
  for Deep Learning with Anonymized Intermediate Representations
TIPRDC: Task-Independent Privacy-Respecting Data Crowdsourcing Framework for Deep Learning with Anonymized Intermediate Representations
Ang Li
Yixiao Duan
Huanrui Yang
Yiran Chen
Jianlei Yang
8
50
0
23 May 2020
Towards Face Encryption by Generating Adversarial Identity Masks
Towards Face Encryption by Generating Adversarial Identity Masks
Xiao Yang
Yinpeng Dong
Tianyu Pang
Hang Su
Jun Zhu
YueFeng Chen
H. Xue
AAML
PICV
34
72
0
15 Mar 2020
Dynamic Backdoor Attacks Against Machine Learning Models
Dynamic Backdoor Attacks Against Machine Learning Models
A. Salem
Rui Wen
Michael Backes
Shiqing Ma
Yang Zhang
AAML
27
270
0
07 Mar 2020
Adversarial Distributional Training for Robust Deep Learning
Adversarial Distributional Training for Robust Deep Learning
Yinpeng Dong
Zhijie Deng
Tianyu Pang
Hang Su
Jun Zhu
OOD
22
121
0
14 Feb 2020
12
Next