Abstract: Recently, many compressed neural network models have been implemented on embedded platforms. However, there is still a lack of steganographic methods that utilizes these compressed models ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results