[1] |
HOU J W, WANG Z H, LI Y G. A network for makeup face verification based upon deep learning[C]// Proceedings of the 2020 IEEE 5th International Conference on Image, Vision and Computing (ICIVC). 2020:123-127.
|
[2] |
MINAEE S, ABDOLRASHIDI A, SU H, et al. Biometrics recognition using deep learning: A survey[J]. Artificial Intelligence Review, 2023,56(8):8647-8695.
|
[3] |
BALDA E R, BEHBOODI A, MATHAR R. Adversarial examples in deep neural networks: An overview[M]// Deep Lear-
|
|
ning: Algorithms and Applications. Springer, 2020:31-65.
|
[4] |
SABLAYROLLES A, DOUZE M, SCHMID C, et al. White-box vs black-box: Bayes optimal strategies for membership inference[C]// Proceedings of the 36th International Conference on Machine Learning. 2019:5558-5567.
|
[5] |
CHOI Y, CHOI M, KIM M, et al. StarGAN: Unified generative adversarial networks for multi-domain image-to-image translation[C]// Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition. 2018:8789-8797.
|
[6] |
LIU M, DING Y K, XIA M, et al. STGAN: A unified selective transfer network for arbitrary image attribute editing[C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2019:3673-3682.
|
[7] |
HE Z L, ZUO W M, KAN M N, et al. AttGAN: Facial attribute editing by only changing what you want[J]. IEEE Transactions on Image Processing, 2019,28(11):5464-5478.
|
[8] |
KAKIZAKI K, MIYAGAWA T, SINGH I, et al. Toward practical adversarial attacks on face verification systems[C]// Proceedings of the 2021 International Conference of the Biometrics Special Interest Group (BIOSIG). 2021. DOI: 10.1109/BIOSIG52210.2021.9548310.
|
[9] |
XIA P P, ZHANG L, LI F Z. Learning similarity with cosine similarity ensemble[J]. Information Sciences, 2015,307:39-52.
|
[10] |
BROCKER J. Evaluating raw ensembles with the continuous ranked probability score[J]. Quarterly Journal of the Royal Meteorological Society, 2012,138(667):1611-1617.
|
[11] |
DAI Y M, GIESEKE F, OEHMCKE S, et al. Attentional feature fusion[C]// Proceedings of the 2021 IEEE/CVF Winter Conference on Applications of Computer Vision. 2021:3559-3568.
|
[12] |
GOODFELLOW I J, SHLENS J, SZEGEDY C. Explaining and harnessing adversarial examples[J]. arXiv preprint arXiv:1412.6572, 2014.
|
[13] |
KURAKIN A, GOODFELLOW I, BENGIO S. Adversarial examples in the physical world[M]// Artificial Intelligence Safety and Security. Chapman and Hall/CRC, 2018:99-112.
|
[14] |
MADRY A, MAKELOV A, SCHMIDT L, et al. Towards deep learning models resistant to adversarial attacks[J]. arXiv preprint arXiv:1706.06083, 2017.
|
[15] |
DEB D, ZHANG J B, JAIN A K. AdvFaces: Adversarial face synthesis[C]// Proceedings of the 2020 IEEE International Joint Conference on Biometrics (IJCB). 2020. DOI: 10.1109/IJCB48548.2020.9304898.
|
[16] |
QIU H R, XIAO C W, YANG L, et al. SemanticAdv: Generating adversarial examples via attribute-conditioned image editing[C]// Proceedings of the 2020 16th European Conference on Computer Vision. 2020:19-37.
|
[17] |
REN H L, HUANG T, YAN H Y. Adversarial examples: Attacks and defenses in the physical world[J]. International Journal of Machine Learning and Cybernetics, 2021,12(11):3325-3336.
|
[18] |
AKHTAR N, MIAN A. Threat of adversarial attacks on deep learning in computer vision: A survey[J]. IEEE Access, 2018,6:14410-14430.
|
[19] |
DENG J K, GUO J, XUE N N, et al. ArcFace: Additive angular margin loss for deep face recognition[C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2019:4685-4694.
|
[20] |
LIU Z W, LUO P, WANG X G, et al. Large-scale celebfaces attributes (celebA) dataset[DB/OL]. [2023-05-20]. https://mmlab.ie.cuhk.edu.hk/projects/CelebA.html.
|
[21] |
SCHROFF F, KALENICHENKO D, PHILBIN J. FaceNet: A unified embedding for face recognition and clustering[C]// Proceedings of the IEEE 2015 Conference on Computer Vision and Pattern Recognition. 2015:815-823.
|
[22] |
LIU W Y, WEN Y D, YU Z D, et al. SphereFace: Deep hypersphere embedding for face recognition[C]// Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition. 2017:6738-6746.
|
[23] |
WANG H, WANG Y T, ZHOU Z, et al. CosFace: Large margin cosine loss for deep face recognition[C]// Proceedings of the 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2018:5265-5274.
|
[24] |
TARG S, ALMEIDA D, LYMAN K. Resnet in resnet: Generalizing residual architectures[J]. arXiv preprint arXiv:1603.08029, 2016.
|
[25] |
CHINAEV N, CHIGORIN A, LAPTEV I. MobileFace: 3D face reconstruction with efficient CNN regression[J]. arXiv preprint arXiv:1809.08809, 2018.
|
[26] |
WEI X X, GUO Y, YU J. Adversarial sticker: A stealthy attack method in the physical world[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2023,45(3):2711-2725.
|
[27] |
ZOLFI A, AVIDAN S, ELOVICI Y, et al. Adversarial mask: Real-world universal adversarial attack on face recognition models[C]// Proceedings of the 2022 Joint European Conference on Machine Learning and Knowledge Discovery in Databases. 2022:304-320.
|