Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …
been remarkable. Deep learning, in particular, has been extensively used to drive …
Physical adversarial attack meets computer vision: A decade survey
Despite the impressive achievements of Deep Neural Networks (DNNs) in computer vision,
their vulnerability to adversarial attacks remains a critical concern. Extensive research has …
their vulnerability to adversarial attacks remains a critical concern. Extensive research has …
LAS-AT: adversarial training with learnable attack strategy
Adversarial training (AT) is always formulated as a minimax problem, of which the
performance depends on the inner optimization that involves the generation of adversarial …
performance depends on the inner optimization that involves the generation of adversarial …
Deep learning for face anti-spoofing: A survey
Face anti-spoofing (FAS) has lately attracted increasing attention due to its vital role in
securing face recognition systems from presentation attacks (PAs). As more and more …
securing face recognition systems from presentation attacks (PAs). As more and more …
Protecting facial privacy: Generating adversarial identity masks via style-robust makeup transfer
While deep face recognition (FR) systems have shown amazing performance in
identification and verification, they also arouse privacy concerns for their excessive …
identification and verification, they also arouse privacy concerns for their excessive …
Query-efficient decision-based black-box patch attack
Deep neural networks (DNNs) have been showed to be highly vulnerable to imperceptible
adversarial perturbations. As a complementary type of adversary, patch attacks that …
adversarial perturbations. As a complementary type of adversary, patch attacks that …
Exploring frequency adversarial attacks for face forgery detection
Various facial manipulation techniques have drawn serious public concerns in morality,
security, and privacy. Although existing face forgery classifiers achieve promising …
security, and privacy. Although existing face forgery classifiers achieve promising …
Sibling-attack: Rethinking transferable adversarial attacks against face recognition
A hard challenge in develo** practical face recognition (FR) attacks is due to the black-
box nature of the target FR model, ie, inaccessible gradient and parameter information to …
box nature of the target FR model, ie, inaccessible gradient and parameter information to …
Adv-attribute: Inconspicuous and transferable adversarial attack on face recognition
Deep learning models have shown their vulnerability when dealing with adversarial attacks.
Existing attacks almost perform on low-level instances, such as pixels and super-pixels, and …
Existing attacks almost perform on low-level instances, such as pixels and super-pixels, and …
Clip2protect: Protecting facial privacy using text-guided makeup via adversarial latent search
The success of deep learning based face recognition systems has given rise to serious
privacy concerns due to their ability to enable unauthorized tracking of users in the digital …
privacy concerns due to their ability to enable unauthorized tracking of users in the digital …