Research Article
[Retracted] Cloud Data Access Prevention Method in Face Recognition Technology Based on Computer Vision
Figure 7
Face detection performance analysis of Print Attack library. (a) DeepFool method. (b) Methods Based on Minimum Perturbation Dimension.
(a) |
(b) |