deep learning, privacy protection, computer vision, adversarial attack, adversarial example ,"/>
Journal of Jilin University (Information Science Edition) ›› 2024, Vol. 42 ›› Issue (1): 59-66.
Previous Articles Next Articles
LI Wanying a,b , LIU Xueyan a,b , YANG Bo a,b