Security and Communication Networks / 2017 / Article / Fig 3

Research Article

Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth

Figure 3

Region proposal process in the training phase and in our algorithm.
(a) In training phase
(b) In our algorithm

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19.