1 code implementation • 6 Feb 2024 • Hao Fang, Yixiang Qiu, Hongyao Yu, Wenbo Yu, Jiawei Kong, Baoli Chong, Bin Chen, Xuan Wang, Shu-Tao Xia
Model Inversion (MI) attacks aim to disclose private information about the training data by abusing access to the pre-trained models.
no code implementations • 12 Dec 2019 • Yiqun Dong, Yuanxin Zhong, Wenbo Yu, Minghan Zhu, Pingping Lu, Yeyang Fang, Jiajun Hong, Huei Peng
The main goal of this paper is to introduce the data collection effort at Mcity targeting automated vehicle development.