Securing CNN Model and Biometric Template using Blockchain
暂无分享,去创建一个
Mayank Vatsa | Nalini Ratha | Richa Singh | Akshay Agarwal | Akhil Goel | N. Ratha | Mayank Vatsa | Richa Singh | Akshay Agarwal | Akhil Goel
[1] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[2] Richa Singh,et al. Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition , 2019, International Journal of Computer Vision.
[3] Richa Singh,et al. Unravelling Robustness of Deep Learning based Face Recognition Against Adversarial Attacks , 2018, AAAI.
[4] Richa Singh,et al. Are Image-Agnostic Universal Adversarial Perturbations for Face Recognition Difficult to Detect? , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[5] Mayank Vatsa,et al. DeepRing: Protecting Deep Neural Network With Blockchain , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[6] Christian Catalini,et al. Blockchain Technology for Healthcare: Facilitating the Transition to Patient-Driven Interoperability , 2018, Computational and structural biotechnology journal.
[7] Anish Jindal,et al. EnergyChain: Enabling Energy Trading for Smart Homes using Blockchains in Smart Grid Ecosystem , 2018, SmartCitiesSecurity@MobiHoc.
[8] Takeo Kanade,et al. Multi-PIE , 2008, 2008 8th IEEE International Conference on Automatic Face & Gesture Recognition.
[9] Johan A. Pouwelse,et al. Deployment of a Blockchain-Based Self-Sovereign Identity , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[10] Jinfeng Yi,et al. EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples , 2017, AAAI.
[11] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[12] Yonghao Wang,et al. A Simple Auditable Fingerprint Authentication Scheme Using Smart-Contracts , 2018, SmartBlock.
[13] Richa Singh,et al. SmartBox: Benchmarking Adversarial Detection and Mitigation Algorithms for Face Recognition , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[14] Andrew Zisserman,et al. Deep Face Recognition , 2015, BMVC.
[15] Sébastien Marcel,et al. Biometric Antispoofing Methods: A Survey in Face Recognition , 2014, IEEE Access.
[16] Paco Garcia,et al. Biometrics on the blockchain , 2018 .
[17] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[18] Julian Fiérrez,et al. Blockchain and Biometrics: A First Look into Opportunities and Challenges , 2019, BLOCKCHAIN.
[19] Ajmal Mian,et al. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.
[20] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[21] Paolo Palmieri,et al. Feather forking as a positive force: incentivising green energy production in a blockchain-based smart grid , 2018, CRYBLOCK@MobiSys.
[22] Sharath Pankanti,et al. Secure one-time biometrie tokens for non-repudiable multi-party transactions , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).
[23] Christoph Busch,et al. Enhancing Breeder Document Long-Term Security Using Blockchain Technology , 2017, 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC).
[24] Adi Shamir,et al. How to share a secret , 1979, CACM.