no code implementations • 6 May 2024 • Geunu Jeong, Hyeonsoo Kim, Joonyoung Yang, Kyungeun Jang, Jeewook Kim
Additionally, we assess its compatibility with various scan parameter sets and its generalizability across scanner vendors not seen during training.
no code implementations • 4 Aug 2022 • Jonghu Jeong, Minyong Cho, Philipp Benz, Jinwoo Hwang, Jeewook Kim, Seungkwan Lee, Tae-hoon Kim
We further conduct a user study to qualitatively assess our defense of the reconstruction attack.