Login / Signup
RSTAM: An Effective Black-Box Impersonation Attack on Face Recognition using a Mobile and Compact Printer.
Xiaoliang Liu
Furao Shen
Jian Zhao
Changhai Nie
Published in:
CoRR (2022)
Keyphrases
</>
black box
white box
black boxes
authentication protocol
mobile devices
integration testing
test cases
state transition
secret key
learning algorithm
artificial intelligence
training set
software engineering
mobile phone
context aware
security analysis