Sibling-Attack: Rethinking Transferable Adversarial Attacks against Face Recognition.
Zexin LiBangjie YinTaiping YaoJunfeng GuoShouhong DingSimin ChenCong LiuPublished in: CoRR (2023)
Keyphrases
- face recognition
- countermeasures
- attack detection
- malicious users
- differential power analysis
- malicious attacks
- denial of service attacks
- attack scenarios
- power analysis
- cyber attacks
- ddos attacks
- dos attacks
- security risks
- data corruption
- fault injection
- denial of service
- injection attacks
- block cipher
- face images
- detecting malicious
- phishing attacks
- security measures
- network intrusion
- network intrusions
- digital watermark
- network attacks
- information leakage
- recognition rate
- intrusion detection system
- discriminant analysis
- distributed denial of service attacks
- information security
- security vulnerabilities
- face detection
- multi agent
- computer vision
- network security
- principal component analysis
- human faces
- network anomaly detection
- defense mechanisms
- malicious activities
- anomaly detection
- linear discriminant analysis
- facial images
- detect malicious
- misuse detection
- buffer overflow
- normal traffic
- network intrusion detection
- normal behavior
- malicious nodes
- watermarking scheme
- attack graphs