no code implementations • 6 Dec 2023 • Kira Prabhu, Jane Wu, Lynn Tsai, Peter Hedman, Dan B Goldman, Ben Poole, Michael Broxton
We compare our approach to 3D inpainting methods that focus on object removal.
no code implementations • 25 Sep 2017 • David Fifield, Lynn Tsai, Qi Zhong
Our goal is to empirically discover how censors react to the introduction of new proxy servers that can be used to circumvent their information controls.
Cryptography and Security