Alert button
Picture for Chau Yi Li

Chau Yi Li

Alert button

On the limits of perceptual quality measures for enhanced underwater images

Add code
Bookmark button
Alert button
Jul 12, 2022
Chau Yi Li, Andrea Cavallaro

Figure 1 for On the limits of perceptual quality measures for enhanced underwater images
Figure 2 for On the limits of perceptual quality measures for enhanced underwater images
Figure 3 for On the limits of perceptual quality measures for enhanced underwater images
Figure 4 for On the limits of perceptual quality measures for enhanced underwater images
Viaarxiv icon

On the reversibility of adversarial attacks

Add code
Bookmark button
Alert button
Jun 01, 2022
Chau Yi Li, Ricardo Sánchez-Matilla, Ali Shahin Shamsabadi, Riccardo Mazzon, Andrea Cavallaro

Figure 1 for On the reversibility of adversarial attacks
Figure 2 for On the reversibility of adversarial attacks
Figure 3 for On the reversibility of adversarial attacks
Figure 4 for On the reversibility of adversarial attacks
Viaarxiv icon

Training privacy-preserving video analytics pipelines by suppressing features that reveal information about private attributes

Add code
Bookmark button
Alert button
Mar 05, 2022
Chau Yi Li, Andrea Cavallaro

Figure 1 for Training privacy-preserving video analytics pipelines by suppressing features that reveal information about private attributes
Figure 2 for Training privacy-preserving video analytics pipelines by suppressing features that reveal information about private attributes
Figure 3 for Training privacy-preserving video analytics pipelines by suppressing features that reveal information about private attributes
Figure 4 for Training privacy-preserving video analytics pipelines by suppressing features that reveal information about private attributes
Viaarxiv icon

Underwater image filtering: methods, datasets and evaluation

Add code
Bookmark button
Alert button
Dec 22, 2020
Chau Yi Li, Riccardo Mazzon, Andrea Cavallaro

Figure 1 for Underwater image filtering: methods, datasets and evaluation
Figure 2 for Underwater image filtering: methods, datasets and evaluation
Figure 3 for Underwater image filtering: methods, datasets and evaluation
Figure 4 for Underwater image filtering: methods, datasets and evaluation
Viaarxiv icon

Exploiting vulnerabilities of deep neural networks for privacy protection

Add code
Bookmark button
Alert button
Jul 19, 2020
Ricardo Sanchez-Matilla, Chau Yi Li, Ali Shahin Shamsabadi, Riccardo Mazzon, Andrea Cavallaro

Figure 1 for Exploiting vulnerabilities of deep neural networks for privacy protection
Figure 2 for Exploiting vulnerabilities of deep neural networks for privacy protection
Figure 3 for Exploiting vulnerabilities of deep neural networks for privacy protection
Figure 4 for Exploiting vulnerabilities of deep neural networks for privacy protection
Viaarxiv icon