- Run 01: FaceSwap
- Try swapping the face to fully hide the true identity of the drivers while preserving other information, such as facial expressions, behaviours, etc.
- Run 02: Adversarial Attack
- While preventing and limiting unauthorized models from accessing and exploiting information of the de-identified data. The authorized model can access all information of the de-identified data.
Original image | Adversarial Pertubation | FaceSwap |
---|---|---|