Security of Facial Forensics Models Against Adversarial Attacks
暂无分享,去创建一个
[1] Sébastien Marcel,et al. Speaker Inconsistency Detection in Tampered Video , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).
[2] Siwei Lyu,et al. Exposing DeepFake Videos By Detecting Face Warping Artifacts , 2018, CVPR Workshops.
[3] Lujo Bauer,et al. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.
[4] Ajmal Mian,et al. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.
[5] Patrick D. McDaniel,et al. Adversarial Examples for Malware Detection , 2017, ESORICS.
[6] Pan He,et al. Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[7] Alan L. Yuille,et al. Adversarial Examples for Semantic Segmentation and Object Detection , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[8] Thomas Brox,et al. Universal Adversarial Perturbations Against Semantic Image Segmentation , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[9] Xin Yang,et al. Exposing Deep Fakes Using Inconsistent Head Poses , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[10] Siwei Lyu,et al. In Ictu Oculi: Exposing AI Generated Fake Face Videos by Detecting Eye Blinking , 2018, ArXiv.
[11] Junichi Yamagishi,et al. Multi-task Learning for Detecting and Segmenting Manipulated Facial Images and Videos , 2019, 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[12] Percy Liang,et al. Adversarial Examples for Evaluating Reading Comprehension Systems , 2017, EMNLP.
[13] Anil K. Jain,et al. Face Spoof Detection With Image Distortion Analysis , 2015, IEEE Transactions on Information Forensics and Security.
[14] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[15] Junichi Yamagishi,et al. MesoNet: a Compact Facial Video Forgery Detection Network , 2018, 2018 IEEE International Workshop on Information Forensics and Security (WIFS).
[16] Andreas Rössler,et al. ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection , 2018, ArXiv.
[17] Andreas Rössler,et al. FaceForensics++: Learning to Detect Manipulated Facial Images , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[18] Bin Li,et al. Identification of deep network generated images using disparities in color components , 2020, Signal Process..
[19] R. Venkatesh Babu,et al. Generalizable Data-Free Objective for Crafting Universal Adversarial Perturbations , 2018, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[20] Bolin Chen,et al. Fake Faces Identification via Convolutional Neural Network , 2018, IH&MMSec.
[21] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[22] Seyed-Mohsen Moosavi-Dezfooli,et al. Universal Adversarial Perturbations , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[23] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[24] Bin Li,et al. Detection of Deep Network Generated Images Using Disparities in Color Components , 2018, ArXiv.
[25] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.