1 code implementation • 18 Sep 2021 • Zihang Zou, Boqing Gong, Liqiang Wang
We study protecting a user's data (images in this work) against a learner's unauthorized use in training neural networks.