Page
%P
-
Chapter
Adversarial Attacks on Face Recognition Systems
Face has been widely used for identity verification both in supervised and unsupervised access control applications. The advancement in deep neural networks has opened up the possibility of scaling it to m...