Deep face recognition: A survey
Deep learning applies multiple processing layers to learn representations of data with
multiple levels of feature extraction. This emerging technique has reshaped the research …
multiple levels of feature extraction. This emerging technique has reshaped the research …
Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures
Security and privacy of users have become significant concerns due to the involvement of
the Internet of Things (IoT) devices in numerous applications. Cyber threats are growing at …
the Internet of Things (IoT) devices in numerous applications. Cyber threats are growing at …
Biometrics: Trust, but verify
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …
applications around the globe. This proliferation can be attributed to the high levels of …
Detecting and mitigating adversarial perturbations for robust face recognition
Deep neural network (DNN) architecture based models have high expressive power and
learning capacity. However, they are essentially a black box method since it is not easy to …
learning capacity. However, they are essentially a black box method since it is not easy to …
Bayesian evolutionary optimization for crafting high-quality adversarial examples with limited query budget
Due to the importance of security, the adversarial attack has become an increasingly
popular area for deep learning, especially the black-box adversarial attack, which can only …
popular area for deep learning, especially the black-box adversarial attack, which can only …
Image transformation-based defense against adversarial perturbation on deep learning models
Deep learning algorithms provide state-of-the-art results on a multitude of applications.
However, it is also well established that they are highly vulnerable to adversarial …
However, it is also well established that they are highly vulnerable to adversarial …
On the robustness of face recognition algorithms against attacks and bias
Face recognition algorithms have demonstrated very high recognition performance,
suggesting suitability for real world applications. Despite the enhanced accuracies …
suggesting suitability for real world applications. Despite the enhanced accuracies …
Adversarial examples in deep learning for multivariate time series regression
GR Mode, KA Hoque - 2020 IEEE Applied Imagery Pattern …, 2020 - ieeexplore.ieee.org
Multivariate time series (MTS) regression tasks are common in many real-world data mining
applications including finance, cybersecurity, energy, healthcare, prognostics, and many …
applications including finance, cybersecurity, energy, healthcare, prognostics, and many …
Adversarial attacks against face recognition: A comprehensive study
Face recognition (FR) systems have demonstrated reliable verification performance,
suggesting suitability for real-world applications ranging from photo tagging in social media …
suggesting suitability for real-world applications ranging from photo tagging in social media …
Detecting face2face facial reenactment in videos
Visual content has become the primary source of information, as evident in the billions of
images and videos, shared and uploaded every single day. This has led to an increase in …
images and videos, shared and uploaded every single day. This has led to an increase in …