Picture for Chau Yi Li

Chau Yi Li

On the limits of perceptual quality measures for enhanced underwater images

Add code
Jul 12, 2022
Figure 1 for On the limits of perceptual quality measures for enhanced underwater images
Figure 2 for On the limits of perceptual quality measures for enhanced underwater images
Figure 3 for On the limits of perceptual quality measures for enhanced underwater images
Figure 4 for On the limits of perceptual quality measures for enhanced underwater images
Viaarxiv icon

On the reversibility of adversarial attacks

Add code
Jun 01, 2022
Figure 1 for On the reversibility of adversarial attacks
Figure 2 for On the reversibility of adversarial attacks
Figure 3 for On the reversibility of adversarial attacks
Figure 4 for On the reversibility of adversarial attacks
Viaarxiv icon

Training privacy-preserving video analytics pipelines by suppressing features that reveal information about private attributes

Add code
Mar 05, 2022
Figure 1 for Training privacy-preserving video analytics pipelines by suppressing features that reveal information about private attributes
Figure 2 for Training privacy-preserving video analytics pipelines by suppressing features that reveal information about private attributes
Figure 3 for Training privacy-preserving video analytics pipelines by suppressing features that reveal information about private attributes
Figure 4 for Training privacy-preserving video analytics pipelines by suppressing features that reveal information about private attributes
Viaarxiv icon

Underwater image filtering: methods, datasets and evaluation

Add code
Dec 22, 2020
Figure 1 for Underwater image filtering: methods, datasets and evaluation
Figure 2 for Underwater image filtering: methods, datasets and evaluation
Figure 3 for Underwater image filtering: methods, datasets and evaluation
Figure 4 for Underwater image filtering: methods, datasets and evaluation
Viaarxiv icon

Exploiting vulnerabilities of deep neural networks for privacy protection

Add code
Jul 19, 2020
Figure 1 for Exploiting vulnerabilities of deep neural networks for privacy protection
Figure 2 for Exploiting vulnerabilities of deep neural networks for privacy protection
Figure 3 for Exploiting vulnerabilities of deep neural networks for privacy protection
Figure 4 for Exploiting vulnerabilities of deep neural networks for privacy protection
Viaarxiv icon