Publisher
Springer Nature Singapore
Reference26 articles.
1. Komkov, S., Petiushko,A.: Advhat: real-world adversarial attack on arcface face id system. In: IEEE Conference on Pattern Recognition (ICPR), pp. 819–826 (2021)
2. Sharif, M., Bhagavatula, S., Bauer, L., Reiter, M.K.: Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In: Proceedings of the 2016 ACM Sigsac Conference on Computer and Communications Security, pp. 1528–1540 (2016)
3. Yang, L., Song, Q., Wu, Y.: Attacks on state-of-the-art face recognition using attentional adversarial attack generative network. Multimedia Tools Appl. 80(1), 855–875 (2021)
4. Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: ICLR (2014)
5. Lin, J., Song, C., He, K., Wang, L., Hopcroft, J.E.: Nesterov accelerated gradient and scale invariance for adversarial attacks. In: ICLR (2020)