This work shows that it is possible to fool/attack recent state-of-the-art face detectors which are based on the single-stage networks. Successfully attacking face detectors could be a serious malware vulnerability when deploying a smart surveillance system utilizing face detectors. In addition, for the privacy concern, it helps prevent faces being harvested and stored in the server. We show that existing adversarial perturbation methods are not effective to perform such an attack, especially when there are multiple faces in the inut image. This is because the adversarial perturbation specifically generated for one face may disrupt the adversarial perturbation for another face. In this paper, we call this problem the Instance Perturbation I...
Abstract Face anti-spoofing plays a vital role in security systems including face payment systems a...
In the context of face recognition systems, liveness test is a binary classification task aiming at ...
Face recognition (FR) systems have demonstrated reliable verification performance, suggesting suitab...
Adversarial attacks involve adding, small, often imperceptible, perturbations to inputs with the goa...
Deep Learning methods have become state-of-the-art for solving tasks such as Face Recognition (FR). ...
Machine learning is increasingly used to make sense of our world in areas from spam detection, recom...
With the rise of deep learning and modern technology, Deepfake algorithms can be used to easily forg...
Deep neural network (DNN) architecture based models have high expressive power and learning capacity...
Adversarial attacks on machine learning models have seen increasing interest in the past years. By m...
Deep neural networks (DNNs) are vulnerable to adversarial attacks. In particular, object detectors m...
The widespread adoption of machine learning, especially Deep Neural Networks (DNNs) in daily life, c...
Deep neural network based face recognition models have been shown to be vulnerable to adversarial ex...
Deep neural networks (DNN) are applied in various fields because they afford good performance. Howev...
While deep neural networks (DNNs) achieve impressive performance on environment perception tasks, th...
In machine learning, neural networks have shown to achieve state-of-the-art performance within image...
Abstract Face anti-spoofing plays a vital role in security systems including face payment systems a...
In the context of face recognition systems, liveness test is a binary classification task aiming at ...
Face recognition (FR) systems have demonstrated reliable verification performance, suggesting suitab...
Adversarial attacks involve adding, small, often imperceptible, perturbations to inputs with the goa...
Deep Learning methods have become state-of-the-art for solving tasks such as Face Recognition (FR). ...
Machine learning is increasingly used to make sense of our world in areas from spam detection, recom...
With the rise of deep learning and modern technology, Deepfake algorithms can be used to easily forg...
Deep neural network (DNN) architecture based models have high expressive power and learning capacity...
Adversarial attacks on machine learning models have seen increasing interest in the past years. By m...
Deep neural networks (DNNs) are vulnerable to adversarial attacks. In particular, object detectors m...
The widespread adoption of machine learning, especially Deep Neural Networks (DNNs) in daily life, c...
Deep neural network based face recognition models have been shown to be vulnerable to adversarial ex...
Deep neural networks (DNN) are applied in various fields because they afford good performance. Howev...
While deep neural networks (DNNs) achieve impressive performance on environment perception tasks, th...
In machine learning, neural networks have shown to achieve state-of-the-art performance within image...
Abstract Face anti-spoofing plays a vital role in security systems including face payment systems a...
In the context of face recognition systems, liveness test is a binary classification task aiming at ...
Face recognition (FR) systems have demonstrated reliable verification performance, suggesting suitab...