A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
We use the learned centroids from training features to extract the final features for each testing image and encode our final features with the triangle encoding. ... Sharing images online poses security threats to a wide range of users due to the unawareness of privacy information. Deep features have been demonstrated to be a powerful representation for images. ... .: Privacy-cnh: a framework to detect photo privacy with convolutional neural network using hierarchical features. In: AAAI. pp. 1317–1323 (2016) 24. ...arXiv:1909.10708v1 fatcat:p7226t44azdmpo6625iwaf5ipm
Consequently, representations that are used to solve a task are learned from the data instead of being manually designed. ... However, information security is a domain with unique requirements and challenges. ... Privacy-CNH: A Framework to Detect Photo Privacy with Convolutional Neural Network using Hierarchical Features. ...arXiv:1809.04332v1 fatcat:xfb7lgrkw5cirdl3qvmg3ssnbi