Showing results 1 to 5 of 5
Data Poisoning Attack Aiming the Vulnerability of Continual Learning Han, Gyojin; Choi, Jaehyun; Hong, Hyeong Gwon; Kim, Junmo, 2023 IEEE International Conference on Image Processing (ICIP), IEEE, 2023-10-08 |
Deep Cross-Modal Steganography Using Neural Representations Han, Gyojin; Lee, Dong-Jae; Hur, Jiwan; Choi, Jaehyun; Kim, Junmo, 2023 IEEE International Conference on Image Processing (ICIP), IEEE, 2023-10-08 |
Fix the Noise: Disentangling Source Feature for Controllable Domain Translation Lee, Dongyeun; Lee, Jae Young; Kim, Doyeon; Choi, Jaehyun; Yoo, Jaejun; Kim, Junmo, 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), IEEE, 2023-06 |
I See-Through You: A Framework for Removing Foreground Occlusion in Both Sparse and Dense Light Field Images Hur, Jiwan; Lee, Jae Young; Choi, Jaehyun; Kim, Junmo, 23rd IEEE/CVF Winter Conference on Applications of Computer Vision, WACV 2023, pp.229 - 238, Institute of Electrical and Electronics Engineers Inc., 2023-01 |
Reinforcement Learning-Based Black-Box Model Inversion Attacks Han, Gyojin; Choi, Jaehyun; Lee, Haeil; Kim, Junmo, 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), IEEE, 2023-06 |
Discover