Research Article
[Retracted] Cloud Data Access Prevention Method in Face Recognition Technology Based on Computer Vision
Figure 6
Gradient distributions for different network structures (a) Input image, (b) CNN, (c) CNN with occulsion training added, (d) MRCNN.
(a) |
(b) |
(c) |
(d) |