Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks.
Clemens SeiboldWojciech SamekAnna HilsmannPeter EisertPublished in: CoRR (2018)
Keyphrases
- neural network
- security threats
- security mechanisms
- computationally efficient
- security problems
- security issues
- countermeasures
- cyber attacks
- information security
- security measures
- denial of service attacks
- java card
- highly accurate
- security vulnerabilities
- computer security
- face images
- security risks
- network security
- security protocols
- access control
- artificial neural networks
- malicious users
- identity theft
- fault injection
- secure routing
- chosen plaintext
- security systems
- key management
- security policies
- intrusion detection
- biometric systems
- facial features
- cryptographic algorithms
- security breaches
- security flaws
- face recognition