• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

When Diffusion Model Meets with Adversarial Attack: Generating Transferable Adversarial Examples on Face Recognition.

Yuanbo LiCong HuTianyang XuXiaojun Wu
Published in: ICIG (5) (2023)
Keyphrases