1 code implementation • 16 Jun 2020 • David Ericsson, Adam Östberg, Edvin Listo Zec, John Martinsson, Olof Mogren
The model is trained in two steps: first to filter sensitive information in the spectrogram domain, and then to generate new and private information independent of the filtered one.