Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition
暂无分享,去创建一个
Jilin Li | Shouhong Ding | Zelun Kong | Junfeng Guo | Taiping Yao | Bangjie Yin | Wenxuan Wang | Cong Liu | Jilin Li | Bangjie Yin | Junfeng Guo | Zelun Kong | Cong Liu | Shouhong Ding | Taiping Yao | Wenxuan Wang
[1] James Philbin,et al. FaceNet: A unified embedding for face recognition and clustering , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[2] Alan L. Yuille,et al. Improving Transferability of Adversarial Examples With Input Diversity , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[3] Yu Qiao,et al. Joint Face Detection and Alignment Using Multitask Cascaded Convolutional Networks , 2016, IEEE Signal Processing Letters.
[4] Wei Liu,et al. Efficient Decision-Based Black-Box Adversarial Attacks on Face Recognition , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[5] Qi Tian,et al. FM2u-Net: Face Morphological Multi-Branch Network for Makeup-Invariant Face Verification , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[6] Aleksandr Petiushko,et al. AdvHat: Real-World Adversarial Attack on ArcFace Face ID System , 2019, 2020 25th International Conference on Pattern Recognition (ICPR).
[7] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[8] Weihong Deng,et al. Towards Transferable Adversarial Attack Against Deep Face Recognition , 2021, IEEE Transactions on Information Forensics and Security.
[9] Lujo Bauer,et al. A General Framework for Adversarial Examples with Objectives , 2017, ACM Trans. Priv. Secur..
[10] Hu Zhang,et al. Query-efficient Meta Attack to Deep Neural Networks , 2019, ICLR.
[11] Stefanos Zafeiriou,et al. ArcFace: Additive Angular Margin Loss for Deep Face Recognition , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[12] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[13] Chi-Keung Tang,et al. LADN: Local Adversarial Disentangling Network for Facial Makeup and De-Makeup , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[14] Anil K. Jain,et al. AdvFaces: Adversarial Face Synthesis , 2019, 2020 IEEE International Joint Conference on Biometrics (IJCB).
[15] Feiyue Huang,et al. Delving into Data: Effectively Substitute Training for Black-box Attack , 2021, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[16] Zhiyuan Xu,et al. Adversarial Meta-Learning , 2018, ArXiv.
[17] Marwan Mattar,et al. Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .
[18] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[19] Ananthram Swami,et al. Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.
[20] Pong C. Yuen,et al. Regularized Fine-grained Meta Face Anti-spoofing , 2019, AAAI.
[21] Jun Zhu,et al. Boosting Adversarial Attacks with Momentum , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[22] Dawn Xiaodong Song,et al. Delving into Transferable Adversarial Examples and Black-box Attacks , 2016, ICLR.
[23] Leon A. Gatys,et al. Image Style Transfer Using Convolutional Neural Networks , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[24] Qing Song,et al. Attacks on state-of-the-art face recognition using attentional adversarial attack generative network , 2018, Multim. Tools Appl..
[25] Megha Nawhal,et al. Lifelong GAN: Continual Learning for Conditional Image Generation , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[26] Jie Li,et al. Universal Adversarial Perturbation via Prior Driven Uncertainty Approximation , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[27] Jun Zhu,et al. Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[28] Lujo Bauer,et al. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.