Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Adversarial mask: Real-world universal adversarial attack on face recognition models
Deep learning-based facial recognition (FR) models have demonstrated state-of-the-art
performance in the past few years, even when wearing protective medical face masks …
performance in the past few years, even when wearing protective medical face masks …
Towards transferable attack via adversarial diffusion in face recognition
Modern face recognition systems widely use deep convolutional neural networks (DCNNs).
However, DCNNs are susceptible to adversarial examples, posing security risks to these …
However, DCNNs are susceptible to adversarial examples, posing security risks to these …
[PDF][PDF] Uniid: Spoofing face authentication system by universal identity
Face authentication systems are widely employed in access control systems to ensure the
security of confidential facilities. Recent works have demonstrated their vulnerabilities to …
security of confidential facilities. Recent works have demonstrated their vulnerabilities to …
Rethinking the Vulnerabilities of Face Recognition Systems: From a Practical Perspective
Face Recognition Systems (FRS) have increasingly integrated into critical applications,
including surveillance and user authentication, highlighting their pivotal role in modern …
including surveillance and user authentication, highlighting their pivotal role in modern …
Hierarchical feature transformation attack: Generate transferable adversarial examples for face recognition
Y Li, C Hu, R Wang, X Wu - Applied Soft Computing, 2025 - Elsevier
Face recognition has achieved remarkable success due to the development of deep
convolutional neural networks (DCNNs). However, DCNNs are vulnerable to adversarial …
convolutional neural networks (DCNNs). However, DCNNs are vulnerable to adversarial …
Mitigating undesired interactions between liveness detection components in biometric authentication
Biometric authentication has made great strides throughout the years thanks to better
hardware and software support. However, attackers are unrelenting in finding new ways to …
hardware and software support. However, attackers are unrelenting in finding new ways to …
Causality analysis for neural network security
B SUN - 2024 - ink.library.smu.edu.sg
While neural networks are demonstrating excellent performance in a wide range of
applications, there has been a growing concern on their reliability and dependability. Similar …
applications, there has been a growing concern on their reliability and dependability. Similar …
Generalized Attacks on Face Verification Systems
Face verification (FV) using deep neural network models has made tremendous progress in
recent years, surpassing human accuracy and seeing deployment in various applications …
recent years, surpassing human accuracy and seeing deployment in various applications …
Enhancing Adversarial Patch Effectiveness for Face Recognition Systems Using Sharpness-Aware Minimization
C Wu, T Zhang, Z Li, Z Lian - 2024 IEEE Cyber Science and …, 2024 - ieeexplore.ieee.org
Facial recognition stands as a prevalent authen-tication solution within numerous biometric
authentication applications. As a crucial alternative means, adversarial attacks serve to …
authentication applications. As a crucial alternative means, adversarial attacks serve to …
[PDF][PDF] Benevolent and Malevolent Adversaries: A Study of GANs and Face Verification Systems
E Nazari - 2023 - ruor.uottawa.ca
Cybersecurity is rapidly evolving, necessitating inventive solutions for emerging challenges.
Deep Learning (DL), having demonstrated remarkable capabilities across various domains …
Deep Learning (DL), having demonstrated remarkable capabilities across various domains …