MorGAN: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Generative Adversarial Network.
Naser DamerAlexandra Mosegui SaladieAndreas BraunArjan KuijperPublished in: BTAS (2018)
Keyphrases
- buffer overflow
- attack graphs
- denial of service
- dos attacks
- attack graph
- security risks
- denial of service attacks
- network intrusion
- network attacks
- attack scenarios
- data corruption
- cyber attacks
- intrusion detection
- recognition algorithm
- ddos attacks
- normal traffic
- network security
- countermeasures
- recognition rate
- security vulnerabilities
- security measures
- recognition accuracy
- network anomaly detection
- fault injection
- attack detection
- traffic analysis
- malicious users
- network traffic
- recognition engine
- malicious traffic
- differential power analysis
- malicious attacks
- recognition scheme
- security threats
- object recognition
- face images
- generative model
- network intrusion detection
- anomaly detection
- alert correlation
- human faces
- computer networks
- intrusion detection system
- feature extraction
- cyber security
- security problems
- power analysis
- smart card
- biometric systems
- malicious nodes
- java card
- malicious activities
- wireless sensor networks
- phishing attacks