2020
DOI: 10.1007/s11042-020-09604-z
|View full text |Cite
|
Sign up to set email alerts
|

Attacks on state-of-the-art face recognition using attentional adversarial attack generative network

Abstract: With the broad use of face recognition, its weakness gradually emerges that it is able to be attacked. Therefore, it is very important to study how face recognition networks are subject to attacks. Generating adversarial examples is an effective attack method, which misleads the face recognition system through obfuscation attack (rejecting a genuine subject) or impersonation attack (matching to an impostor). In this paper, we introduce a novel GAN, Attentional Adversarial Attack Generative Network (A 3 GN), to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 53 publications
(29 citation statements)
references
References 46 publications
0
29
0
Order By: Relevance
“…Adversarial patches for faces are also studied for their transferability in [245]. In another related example, Yang et al [246] proposed an Attentional Adversarial Attack Generative Network (A 3 GN ) for targeted fooling of face recognition models. It is claimed that their network is able to exploit geometric and context information of the target with the help of a conditional VAE and attention modules to achieve this feat.…”
Section: Face Recognitionmentioning
confidence: 99%
“…Adversarial patches for faces are also studied for their transferability in [245]. In another related example, Yang et al [246] proposed an Attentional Adversarial Attack Generative Network (A 3 GN ) for targeted fooling of face recognition models. It is claimed that their network is able to exploit geometric and context information of the target with the help of a conditional VAE and attention modules to achieve this feat.…”
Section: Face Recognitionmentioning
confidence: 99%
“…Bousnina et al [20] achieved high attack success rate by a black-box attack method in a CNN network based on transfer learning. Yang et al [21] introduced a new Attentional Adversarial Attack Generation Network (A 3 GN) as a way to generate the same adversarial examples as the original face images; unlike the traditional GAN, A 3 GN uses the face recognition network for the third player to participate in the competition between the generator and the discriminator. Yang et al [22] observed that ℓ0-norm has good sparsity but is hard to solve; for this reason, they proposed to use ℓq-norm to approximate ℓ0-norm and attack the face antispoofing task with the goal of minimizing the ℓq distance from the original image.…”
Section: Adversarial Attack Methodsmentioning
confidence: 99%
“…In previous works [18,19] on face antispoofing models against attacks, people used relatively basic single-modality convolutional networks to conduct experiments and achieved good attack results. However, the above research did not test the attack effect on Depth and IR images, such as [21]. Meanwhile, as the robustness models in this field continue to be researched in depth, whether existing models, especially multimodality models, can resist adversarial attacks remains to be experimented.…”
Section: Adversarial Attacks On Single-modality and Multimodality Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Deep learning, on the other hand, can learn the hierarchical features of pathologies automatically, eliminating the need to manually design the morphological operations of feature extraction and classifier. The deep learning approach excels in several fields, including signal processing [10], pedestrian detection [11], face recognition [12], road crack detection [13], biomedical image analysis [14], and many others. Furthermore, deep learning techniques have produced promising results throughout the agricultural field, helping more farmers and food-producing workers, such as detection of plant disease [15], analysis of weeds [16], discovery of valuable seeds [17], insect detection [18], fruit processing [15], and so on, which has led to dealing with image analysis.…”
Section: Introductionmentioning
confidence: 99%