Research Article

Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth

Figure 2

Faster RCNN detection architecture.