Browse > Article

딥러닝 기반 얼굴인식 모델에 대한 변조 영역 제한 기만공격  

Ryu, Gwonsang (공주대학교 대학원 융합과학과)
Park, Hosung (공주대학교 산학협력단)
Choi, Daeseon (공주대학교 의료정보학과)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 김형일, 문진영, 박종열, "딥러닝 기반 고성능 얼굴인식 기술 동향", 전자통신동향분석, 33(4), pp. 43-53, 2018   DOI
2 M. Wang, W. Deng, "Deep Face Recognition: A Survey," arXiv preprint arXiv:1804.06655, 2018.
3 W. Liu, Y. Wen, Z. Yu, and M. Yang, "Large-Margin Softmax Loss for Convolutional Neural Networks," Proceedings of the 33rd International Conference on Machine Learning, pp. 507-516, 2016.
4 W. Liu, Y. Wen, Z. Yu, M. Li, B. Raj, and L. Song, "SphereFace: Deep Hypersphere Embedding for Face Recognition," Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, IEEE, pp. 212-220, 2017.
5 H. Wang, Y. Wang, Z. Zhou, X. Ji, D. Gong, J. Zhou, and W. Liu, "CosFace: Large Margin Cosine Loss for Deep Face Recognition," Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, IEEE, pp. 5265-5274, 2018.
6 Y. Zheng, D.K. Pal, and M. Savvides, "Ring loss: Convex Feature Normalization for Face Recognition," Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, IEEE, pp. 5089-5097, 2018.
7 J. Deng, J. Guo, N. Xue, and S. Zafeiriou, "ArcFace: Additive Angular Margin Loss for Deep Face Recognition," arXiv preprint arXiv:1801.07698, 2018.
8 G. Hinton, L. Deng, D. Yu, G. Dahl, A.R. Mohamed, N. Jaitly, and T. Sainath, "Deep Neural Networks for Acoustic Modeling in Speech Recognition," IEEE Signal Processing Magazine, 29(6), pp. 82-97, 2012.   DOI
9 S. Potluri and C. Diedrich, "Accelerated Deep Neural Networks for Enhanced Intrusion Detection System," 2016 IEEE 21st International Conference on Emerging technologies and Factory Automation, pp. 1-8, 2016.
10 K. Eykholt, I. Evtimov, E. Fernandes, B. Li, A. Rahmati, C. Xiao, and D. Song, "Robust Physical-World Attacks on Deep Learning Visual Classification," Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, IEEE, pp. 1625-1634, 2018.
11 N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z.B. Celik, and A. Swami, "The Limitations of Deep Learning in Adversarial Settings," 2016 IEEE European Symposium on Security and Privacy, IEEE, pp. 372-387, 2016.
12 권현, 윤현수, 최대선, "Evasion attack에 대한 인공지능 보안 이슈," 정보과학회지, 36(2), pp. 32-36, 2018.
13 I. Goodfellow, J. Shlens, and C. Szegedy, "Explaining and Harnessing Adversarial Examples," arXiv preprint arXiv:1412.6572, 2014.
14 S.M Moosavi-Dezfooli, A. Fawzi, and P. Frossard, "Deepfool: a Simple and Accurate Method to Fool Deep Neural Networks," Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, IEEE, pp. 2574-2582, 2016.
15 N. Carlini, D. Wagner, "Towards Evaluating the Robustness of Neural Networks," 2017 IEEE Symposium on Security and Privacy, IEEE, pp. 39-57, 2017.
16 K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, "Joint Face Detection and Alignment using Multi-task Cascaded Convolutional Networks," IEEE Signal Processing Letters, 23(10), pp. 1499-1503, 2016.   DOI
17 A. Bulat and G. Tzimiropoulos, "How Far are We from Solving The 2D & 3D Face Alignment Problem?(and a Dataset of 230,000 3D Facial Landmarks)," Proceedings of the IEEE International Conference on Computer Vision, IEEE, pp. 1021-1030, 2017.
18 K. He, X. Zhang, S.Ren, and J. Sun, "Identity Mappings in Deep Residual Networks," European Conference on Computer Vision, Springer, pp. 630-645, 2016.
19 C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus, "Intriguing Properties of Neural Networks," arXiv preprint arXiv:1312.6199, 2013.
20 M.T. Ribeiro, S. Singh, and C. Guestrin, "Why Should I Trust You?: Explaining the Predictions of Any Classifier," Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, pp. 1135-1144, 2016.