Adversarial mask: Real-world universal adversarial attack on face recognition models

A Zolfi, S Avidan, Y Elovici, A Shabtai - Joint European Conference on …, 2022 - Springer
Deep learning-based facial recognition (FR) models have demonstrated state-of-the-art
performance in the past few years, even when wearing protective medical face masks …

Towards transferable attack via adversarial diffusion in face recognition

C Hu, Y Li, Z Feng, X Wu - IEEE Transactions on Information …, 2024 - ieeexplore.ieee.org
Modern face recognition systems widely use deep convolutional neural networks (DCNNs).
However, DCNNs are susceptible to adversarial examples, posing security risks to these …

[PDF][PDF] Uniid: Spoofing face authentication system by universal identity

Z Wu, Y Cheng, S Zhang, X Ji… - Proceedings of Network …, 2024 - ndss-symposium.org
Face authentication systems are widely employed in access control systems to ensure the
security of confidential facilities. Recent works have demonstrated their vulnerabilities to …

Rethinking the Vulnerabilities of Face Recognition Systems: From a Practical Perspective

J Chen, Z Shen, Y Pu, C Zhou, C Li, J Li… - arxiv preprint arxiv …, 2024 - arxiv.org
Face Recognition Systems (FRS) have increasingly integrated into critical applications,
including surveillance and user authentication, highlighting their pivotal role in modern …

Hierarchical feature transformation attack: Generate transferable adversarial examples for face recognition

Y Li, C Hu, R Wang, X Wu - Applied Soft Computing, 2025 - Elsevier
Face recognition has achieved remarkable success due to the development of deep
convolutional neural networks (DCNNs). However, DCNNs are vulnerable to adversarial …

Mitigating undesired interactions between liveness detection components in biometric authentication

E Lavens, D Preuveneers, W Joosen - Proceedings of the 18th …, 2023 - dl.acm.org
Biometric authentication has made great strides throughout the years thanks to better
hardware and software support. However, attackers are unrelenting in finding new ways to …

Causality analysis for neural network security

B SUN - 2024 - ink.library.smu.edu.sg
While neural networks are demonstrating excellent performance in a wide range of
applications, there has been a growing concern on their reliability and dependability. Similar …

Generalized Attacks on Face Verification Systems

E Nazari, P Branco, GV Jourdan - arxiv preprint arxiv:2309.05879, 2023 - arxiv.org
Face verification (FV) using deep neural network models has made tremendous progress in
recent years, surpassing human accuracy and seeing deployment in various applications …

Enhancing Adversarial Patch Effectiveness for Face Recognition Systems Using Sharpness-Aware Minimization

C Wu, T Zhang, Z Li, Z Lian - 2024 IEEE Cyber Science and …, 2024 - ieeexplore.ieee.org
Facial recognition stands as a prevalent authen-tication solution within numerous biometric
authentication applications. As a crucial alternative means, adversarial attacks serve to …

[PDF][PDF] Benevolent and Malevolent Adversaries: A Study of GANs and Face Verification Systems

E Nazari - 2023 - ruor.uottawa.ca
Cybersecurity is rapidly evolving, necessitating inventive solutions for emerging challenges.
Deep Learning (DL), having demonstrated remarkable capabilities across various domains …