no code implementations • 25 May 2023 • Siping Shi, Bihai Zhang, Dan Wang
We can also evaluate a privacy protection scheme, e. g., assume it obfuscates the video data, what level of protection this scheme has achieved after obfuscation.