Adversarial Attacks on Kinship Verification using Transformer.
Jiaxuan ZhuMing ShaoChao XiaHong PanSiyu XiaPublished in: FG (2021)
Keyphrases
- java card
- cryptographic protocols
- countermeasures
- fuzzy logic
- model checking
- watermarking scheme
- malicious attacks
- verification method
- security threats
- formal verification
- security protocols
- fault diagnosis
- artificial intelligence
- traffic analysis
- smart card
- anomaly detection
- incipient fault
- power transformers
- terrorist attacks
- data corruption
- partial discharge
- denial of service attacks
- watermarking method
- asynchronous circuits
- signature verification
- computer security
- face verification
- power system
- multi agent