4.6 Article

Adversarial Attacks Against Face Recognition: A Comprehensive Study

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Privacy and Security Issues in Deep Learning: A Survey

Ximeng Liu et al.

Summary: Deep Learning algorithms have achieved remarkable success in various domains, but privacy and security issues such as model theft, data inference, and adversarial attacks have been revealed. Research has identified these problems and proposed attack and defense methods to address them.

IEEE ACCESS (2021)

Article Computer Science, Theory & Methods

Towards Transferable Adversarial Attack Against Deep Face Recognition

Yaoyao Zhong et al.

Summary: This study investigates transferable adversarial attacks in face recognition and proposes a new method DFANet based on feature-level methods, significantly improving the transferability of existing attack methods. Experiments show that the proposed method successfully generates a new set of adversarial face pairs that can attack commercial APIs, providing a new database for research on robustness and defense in deep face recognition.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Engineering, Electrical & Electronic

A 0.22-0.89 mW Low-Power and Highly-Secure Always-On Face Recognition Processor With Adversarial Attack Prevention

Youngwoo Kim et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS (2020)

Article Computer Science, Information Systems

Border Control Morphing Attack Detection With a Convolutional Neural Network De-Morphing Approach

David Ortega-Delcampo et al.

IEEE ACCESS (2020)

Review Automation & Control Systems

Adversarial Attacks and Defenses in Images, Graphs and Text: A Review

Han Xu et al.

INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING (2020)

Review Computer Science, Information Systems

Makeup Presentation Attacks: Review and Detection Performance Benchmark

Christian Rathgeb et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Fighting Deepfake by Exposing the Convolutional Traces on Images

Luca Guarnera et al.

IEEE ACCESS (2020)

Article Computer Science, Artificial Intelligence

Virtual Adversarial Training: A Regularization Method for Supervised and Semi-Supervised Learning

Takeru Miyato et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2019)

Article Computer Science, Artificial Intelligence

Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition

Gaurav Goswami et al.

INTERNATIONAL JOURNAL OF COMPUTER VISION (2019)

Article Computer Science, Information Systems

A General Framework for Adversarial Examples with Objectives

Mahmood Sharif et al.

ACM TRANSACTIONS ON PRIVACY AND SECURITY (2019)

Article Computer Science, Artificial Intelligence

Adversarial Examples: Attacks and Defenses for Deep Learning

Xiaoyong Yu et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2019)

Article Computer Science, Artificial Intelligence

One Pixel Attack for Fooling Deep Neural Networks

Jiawei Su et al.

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Ensemble of Predictions from Augmented Input as Adversarial Defense for Face Verification System

Laksono Kurnianggoro et al.

INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2019, PT II (2019)

Article Computer Science, Information Systems

FD-GAN: Face De-Morphing Generative Adversarial Network for Restoring Accomplice's Facial Image

Fei Peng et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Markov Chain Based Efficient Defense Against Adversarial Examples in Computer Vision

Yue Zhou et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Face Friend-Safe Adversarial Example on Face Recognition System

Hyun Kwon et al.

2019 ELEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2019) (2019)

Proceedings Paper Engineering, Electrical & Electronic

Fast Geometrically-Perturbed Adversarial Faces

Ali Dabouei et al.

2019 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV) (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Adversarial Learning with Margin-based Triplet Embedding Regularization

Yaoyao Zhong et al.

2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019) (2019)

Proceedings Paper Imaging Science & Photographic Technology

ADVERSARIAL FACE DE-IDENTIFICATION

Efstathios Chatzikyriakidis et al.

2019 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP) (2019)

Article Computer Science, Information Systems

DDSA: A Defense Against Adversarial Attacks Using Deep Denoising Sparse Autoencoder

Yassine Bakhti et al.

IEEE ACCESS (2019)

Article Computer Science, Theory & Methods

A Light CNN for Deep Face Representation With Noisy Labels

Xiang Wu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

Face Demorphing

Matteo Ferrara et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Proceedings Paper Computer Science, Artificial Intelligence

VGGFace2: A dataset for recognising faces across pose and age

Qiong Cao et al.

PROCEEDINGS 2018 13TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE & GESTURE RECOGNITION (FG 2018) (2018)

Article Computer Science, Artificial Intelligence

Face Verification via Class Sparsity Based Supervised Encoding

Angshul Majumdar et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2017)

Article Multidisciplinary Sciences

Fraudulent ID using face morphs: Experiments on human and automatic recognition

David J. Robertson et al.

PLOS ONE (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Automatic Generation and Detection of Visually Faultless Facial Morphs

Andrey Makrushin et al.

PROCEEDINGS OF THE 12TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER VISION, IMAGING AND COMPUTER GRAPHICS THEORY AND APPLICATIONS (VISIGRAPP 2017), VOL 6 (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Detection of Face Morphing Attacks by Deep Learning

Clemens Seibold et al.

DIGITAL FORENSICS AND WATERMARKING (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Transferable Deep-CNN features for detecting digital and print-scanned morphed face images

R. Raghavendra et al.

2017 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW) (2017)

Proceedings Paper Computer Science, Artificial Intelligence

SphereFace: Deep Hypersphere Embedding for Face Recognition

Weiyang Liu et al.

30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017) (2017)

Proceedings Paper Computer Science, Information Systems

Towards Evaluating the Robustness of Neural Networks

Nicholas Carlini et al.

2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)

Proceedings Paper Computer Science, Artificial Intelligence

The MegaFace Benchmark: 1 Million Faces for Recognition at Scale

Ira Kemelmacher-Shlizerman et al.

2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR) (2016)

Article Computer Science, Artificial Intelligence

PCANet: A Simple Deep Learning Baseline for Image Classification?

Tsung-Han Chan et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2015)

Article Computer Science, Artificial Intelligence

Learning Discriminant Face Descriptor

Zhen Lei et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2014)

Article Computer Science, Artificial Intelligence

Extended SRC: Undersampled Face Recognition via Intraclass Variant Dictionary

Weihong Deng et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2012)

Article Computer Science, Artificial Intelligence

Differential Evolution: A Survey of the State-of-the-Art

Swagatam Das et al.

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION (2011)

Article Computer Science, Artificial Intelligence

Multi-PIE

Ralph Gross et al.

IMAGE AND VISION COMPUTING (2010)

Article Computer Science, Artificial Intelligence

Face description with local binary patterns:: Application to face recognition

Timo Ahonen et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2006)

Article Computer Science, Artificial Intelligence

Gabor feature based classification using the enhanced Fisher linear discriminant model for face recognition

CJ Liu et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2002)

Article Computer Science, Artificial Intelligence

Completely derandomized self-adaptation in evolution strategies

N Hansen et al.

EVOLUTIONARY COMPUTATION (2001)