Sibling-Attack: Rethinking Transferable Adversarial Attacks against Face Recognition.
Zexin LiBangjie YinTaiping YaoJunfeng GuoShouhong DingSimin ChenCong LiuPublished in: CVPR (2023)
Keyphrases
- face recognition
- countermeasures
- attack detection
- malicious users
- differential power analysis
- attack scenarios
- denial of service attacks
- malicious attacks
- ddos attacks
- power analysis
- fault injection
- block cipher
- data corruption
- cyber attacks
- network attacks
- dos attacks
- digital watermark
- injection attacks
- security vulnerabilities
- denial of service
- security risks
- network intrusions
- information security
- discriminant analysis
- multi agent
- face images
- information leakage
- malicious activities
- defense mechanisms
- intrusion detection system
- misuse detection
- intrusion detection
- normal traffic
- computer vision
- network intrusion
- linear discriminant analysis
- security measures
- sql injection
- recognition rate
- face detection
- java card
- smart card
- buffer overflow
- detecting malicious
- phishing attacks
- detect malicious
- distributed denial of service attacks
- feature extraction
- malicious nodes
- human faces
- facial images
- network security
- facial expressions
- anomaly detection
- security threats
- alert correlation
- principal component analysis
- s box
- security mechanisms