Attacks on state-of-the-art face recognition using attentional adversarial attack generative network
With the broad use of face recognition, its weakness gradually emerges that it is able to be attacked. Therefore, it is very important to study how face recognition networks are subject to attacks. Generating adversarial examples is an effective attack method, which misleads the face recognition sys...
Saved in:
Published in | Multimedia tools and applications Vol. 80; no. 1; pp. 855 - 875 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.01.2021
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!