Login / Signup

When Diffusion Model Meets with Adversarial Attack: Generating Transferable Adversarial Examples on Face Recognition.

Yuanbo LiCong HuTianyang XuXiaojun Wu
Published in: ICIG (5) (2023)
Keyphrases