2018
DOI: 10.48550/arxiv.1805.12302
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Adversarial Attacks on Face Detectors using Neural Net based Constrained Optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…At present, researchers have proposed a large number of white-box attacks [36,27,22,23,37]. For example, Bose et al proposed adversarial attacks on face detectors using neural net based constrained optimization [45]. Yu et al proposed a fast adversarial attack example generation framework based on adversarial saliency prediction [46].…”
Section: White-box Adversarial Attack Modelsmentioning
confidence: 99%
“…At present, researchers have proposed a large number of white-box attacks [36,27,22,23,37]. For example, Bose et al proposed adversarial attacks on face detectors using neural net based constrained optimization [45]. Yu et al proposed a fast adversarial attack example generation framework based on adversarial saliency prediction [46].…”
Section: White-box Adversarial Attack Modelsmentioning
confidence: 99%
“…Su et al [36] present a method to generate one-pixel adversarial perturbations to attack models using differential evolution in an extremely specific scenario. In the face recognition domain, Bose et al [3] craft adversarial examples by solving constrained optimization so that face detector can not detect faces. Sharif et al [33] propose a method focusing on facial biometric systems which can be widely used in surveillance and access control.…”
Section: Adversarial Attackmentioning
confidence: 99%