Skip to main content

and
  1. Chapter

    Adversarial Attacks on Face Recognition Systems

    Face  has been widely used for identity verification both in supervised and unsupervised access control applications. The advancement in deep neural networks has opened up the possibility of scaling it to m...

    Ying Xu, Kiran Raja, Raghavendra Ramachandra in Handbook of Digital Face Manipulation and … (2022)