no code implementations • 2 Feb 2024 • Man-Jie Yuan, Zheng Zou, Wei Gao
We decompose the input data (e. g., some images) into sensitive and insensitive segments according to importance and privacy.
Knowledge Distillation Privacy Preserving