ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2112.04558
  4. Cited By
SoK: Anti-Facial Recognition Technology

SoK: Anti-Facial Recognition Technology

8 December 2021
Emily Wenger
Shawn Shan
Haitao Zheng
Ben Y. Zhao
    PICV
ArXivPDFHTML

Papers citing "SoK: Anti-Facial Recognition Technology"

50 / 59 papers shown
Title
Shadows can be Dangerous: Stealthy and Effective Physical-world
  Adversarial Attack by Natural Phenomenon
Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon
Yiqi Zhong
Xianming Liu
Deming Zhai
Junjun Jiang
Xiangyang Ji
AAML
97
147
0
08 Mar 2022
Segment and Complete: Defending Object Detectors against Adversarial
  Patch Attacks with Robust Patch Detection
Segment and Complete: Defending Object Detectors against Adversarial Patch Attacks with Robust Patch Detection
Jiangjiang Liu
Alexander Levine
Chun Pong Lau
Ramalingam Chellappa
Soheil Feizi
AAML
47
77
0
08 Dec 2021
On Brightness Agnostic Adversarial Examples Against Face Recognition
  Systems
On Brightness Agnostic Adversarial Examples Against Face Recognition Systems
Inderjeet Singh
Satoru Momiyama
Kazuya Kakizaki
Toshinori Araki
AAML
49
12
0
29 Sep 2021
Robustness Disparities in Commercial Face Detection
Robustness Disparities in Commercial Face Detection
Samuel Dooley
Tom Goldstein
John P. Dickerson
CVBM
42
13
0
27 Aug 2021
Fairness Properties of Face Recognition and Obfuscation Systems
Fairness Properties of Face Recognition and Obfuscation Systems
Harrison Rosenberg
Brian Tang
Kassem Fawaz
S. Jha
PICV
29
14
0
05 Aug 2021
A Systematical Solution for Face De-identification
A Systematical Solution for Face De-identification
Songlin Yang
Wei Wang
Yuehua Cheng
Jing Dong
PICV
CVBM
29
8
0
19 Jul 2021
Data Poisoning Won't Save You From Facial Recognition
Data Poisoning Won't Save You From Facial Recognition
Evani Radiya-Dixit
Sanghyun Hong
Nicholas Carlini
Florian Tramèr
AAML
PICV
37
57
0
28 Jun 2021
Disrupting Model Training with Adversarial Shortcuts
Disrupting Model Training with Adversarial Shortcuts
Ivan Evtimov
Ian Covert
Aditya Kusupati
Tadayoshi Kohno
AAML
53
10
0
12 Jun 2021
We Can Always Catch You: Detecting Adversarial Patched Objects WITH or
  WITHOUT Signature
We Can Always Catch You: Detecting Adversarial Patched Objects WITH or WITHOUT Signature
Binxiu Liang
Jiachun Li
Jianjun Huang
AAML
49
13
0
09 Jun 2021
Fashion-Guided Adversarial Attack on Person Segmentation
Fashion-Guided Adversarial Attack on Person Segmentation
Marc Treu
Trung-Nghia Le
H. Nguyen
Junichi Yamagishi
Isao Echizen
AAML
43
12
0
17 Apr 2021
DeepBlur: A Simple and Effective Method for Natural Image Obfuscation
DeepBlur: A Simple and Effective Method for Natural Image Obfuscation
Tao Li
Minsoo Choi
PICV
AAML
41
18
0
31 Mar 2021
MagFace: A Universal Representation for Face Recognition and Quality
  Assessment
MagFace: A Universal Representation for Face Recognition and Quality Assessment
Qiang Meng
Shichao Zhao
Zhida Huang
F. Zhou
CVBM
64
487
0
11 Mar 2021
IdentityDP: Differential Private Identification Protection for Face
  Images
IdentityDP: Differential Private Identification Protection for Face Images
Yunqian Wen
Li Song
Bo Liu
Ming Ding
Rong Xie
PICV
65
62
0
02 Mar 2021
Oriole: Thwarting Privacy against Trustworthy Deep Learning Models
Oriole: Thwarting Privacy against Trustworthy Deep Learning Models
Liuqiao Chen
Hu Wang
Benjamin Zi Hao Zhao
Minhui Xue
Hai-feng Qian
PICV
29
4
0
23 Feb 2021
DetectorGuard: Provably Securing Object Detectors against Localized
  Patch Hiding Attacks
DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks
Chong Xiang
Prateek Mittal
AAML
47
52
0
05 Feb 2021
LowKey: Leveraging Adversarial Attacks to Protect Social Media Users
  from Facial Recognition
LowKey: Leveraging Adversarial Attacks to Protect Social Media Users from Facial Recognition
Valeriia Cherepanova
Micah Goldblum
Harrison Foley
Shiyuan Duan
John P. Dickerson
Gavin Taylor
Tom Goldstein
AAML
PICV
47
136
0
20 Jan 2021
Unlearnable Examples: Making Personal Data Unexploitable
Unlearnable Examples: Making Personal Data Unexploitable
Hanxun Huang
Xingjun Ma
S. Erfani
James Bailey
Yisen Wang
MIACV
199
192
0
13 Jan 2021
Sparse Adversarial Attack to Object Detection
Sparse Adversarial Attack to Object Detection
Jiayu Bao
AAML
40
17
0
26 Dec 2020
The Translucent Patch: A Physical and Universal Attack on Object
  Detectors
The Translucent Patch: A Physical and Universal Attack on Object Detectors
Alon Zolfi
Moshe Kravchik
Yuval Elovici
A. Shabtai
AAML
37
88
0
23 Dec 2020
FoggySight: A Scheme for Facial Lookup Privacy
FoggySight: A Scheme for Facial Lookup Privacy
Ivan Evtimov
Pascal Sturmfels
Tadayoshi Kohno
PICV
FedML
41
24
0
15 Dec 2020
FaceGuard: A Self-Supervised Defense Against Adversarial Face Images
FaceGuard: A Self-Supervised Defense Against Adversarial Face Images
Debayan Deb
Xiaoming Liu
Anil K. Jain
CVBM
AAML
PICV
37
27
0
28 Nov 2020
SocialGuard: An Adversarial Example Based Privacy-Preserving Technique
  for Social Images
SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images
Mingfu Xue
Shichang Sun
Zhiyu Wu
Can He
Jian Wang
Weiqiang Liu
PICV
AAML
27
7
0
27 Nov 2020
Invisible Perturbations: Physical Adversarial Examples Exploiting the
  Rolling Shutter Effect
Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect
Athena Sayles
Ashish Hooda
M. Gupta
Rahul Chatterjee
Earlence Fernandes
AAML
31
76
0
26 Nov 2020
Ulixes: Facial Recognition Privacy with Adversarial Machine Learning
Ulixes: Facial Recognition Privacy with Adversarial Machine Learning
Thomas Cilloni
Wei Wang
Charles Walter
Charles Fleming
PICV
AAML
27
8
0
20 Oct 2020
Usage Patterns of Privacy-Enhancing Technologies
Usage Patterns of Privacy-Enhancing Technologies
Kovila P. L. Coopamootoo
12
32
0
22 Sep 2020
Facial Recognition: A cross-national Survey on Public Acceptance,
  Privacy, and Discrimination
Facial Recognition: A cross-national Survey on Public Acceptance, Privacy, and Discrimination
Léa Steinacker
Miriam Meckel
Genia Kostka
Damian Borth
16
11
0
15 Jul 2020
Adversarial Light Projection Attacks on Face Recognition Systems: A
  Feasibility Study
Adversarial Light Projection Attacks on Face Recognition Systems: A Feasibility Study
Luan Nguyen
Sunpreet S. Arora
Yuhang Wu
Hao Yang
AAML
27
88
0
24 Mar 2020
Face-Off: Adversarial Face Obfuscation
Face-Off: Adversarial Face Obfuscation
Varun Chandrasekaran
Chuhan Gao
Brian Tang
Kassem Fawaz
S. Jha
Suman Banerjee
PICV
49
44
0
19 Mar 2020
Towards Face Encryption by Generating Adversarial Identity Masks
Towards Face Encryption by Generating Adversarial Identity Masks
Xiao Yang
Yinpeng Dong
Tianyu Pang
Hang Su
Jun Zhu
YueFeng Chen
H. Xue
AAML
PICV
119
72
0
15 Mar 2020
On Adaptive Attacks to Adversarial Example Defenses
On Adaptive Attacks to Adversarial Example Defenses
Florian Tramèr
Nicholas Carlini
Wieland Brendel
Aleksander Madry
AAML
210
827
0
19 Feb 2020
Radioactive data: tracing through training
Radioactive data: tracing through training
Alexandre Sablayrolles
Matthijs Douze
Cordelia Schmid
Hervé Jégou
59
75
0
03 Feb 2020
Making an Invisibility Cloak: Real World Adversarial Attacks on Object
  Detectors
Making an Invisibility Cloak: Real World Adversarial Attacks on Object Detectors
Zuxuan Wu
Ser-Nam Lim
L. Davis
Tom Goldstein
AAML
111
264
0
31 Oct 2019
DeepPrivacy: A Generative Adversarial Network for Face Anonymization
DeepPrivacy: A Generative Adversarial Network for Face Anonymization
Håkon Hukkelås
Rudolf Mester
Frank Lindseth
PICV
CVBM
51
228
0
10 Sep 2019
AdvHat: Real-world adversarial attack on ArcFace Face ID system
AdvHat: Real-world adversarial attack on ArcFace Face ID system
Stepan Alekseevich Komkov
Aleksandr Petiushko
AAML
CVBM
46
284
0
23 Aug 2019
AdvFaces: Adversarial Face Synthesis
AdvFaces: Adversarial Face Synthesis
Debayan Deb
Jianbang Zhang
Anil K. Jain
GAN
CVBM
AAML
PICV
60
126
0
14 Aug 2019
Transferable Clean-Label Poisoning Attacks on Deep Neural Nets
Transferable Clean-Label Poisoning Attacks on Deep Neural Nets
Chen Zhu
Wenjie Huang
Ali Shafahi
Hengduo Li
Gavin Taylor
Christoph Studer
Tom Goldstein
71
284
0
15 May 2019
Efficient Decision-based Black-box Adversarial Attacks on Face
  Recognition
Efficient Decision-based Black-box Adversarial Attacks on Face Recognition
Yinpeng Dong
Hang Su
Baoyuan Wu
Zhifeng Li
Wen Liu
Tong Zhang
Jun Zhu
CVBM
AAML
62
406
0
09 Apr 2019
Fast Geometrically-Perturbed Adversarial Faces
Fast Geometrically-Perturbed Adversarial Faces
Ali Dabouei
Sobhan Soleymani
J. Dawson
Nasser M. Nasrabadi
CVBM
AAML
43
65
0
24 Sep 2018
ML-Leaks: Model and Data Independent Membership Inference Attacks and
  Defenses on Machine Learning Models
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models
A. Salem
Yang Zhang
Mathias Humbert
Pascal Berrang
Mario Fritz
Michael Backes
MIACV
MIALM
76
935
0
04 Jun 2018
Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using
  Generative Models
Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models
Pouya Samangouei
Maya Kabkab
Rama Chellappa
AAML
GAN
74
1,172
0
17 May 2018
Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks
Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks
Ali Shafahi
Wenjie Huang
Mahyar Najibi
Octavian Suciu
Christoph Studer
Tudor Dumitras
Tom Goldstein
AAML
86
1,080
0
03 Apr 2018
Invisible Mask: Practical Attacks on Face Recognition with Infrared
Invisible Mask: Practical Attacks on Face Recognition with Infrared
Zhe Zhou
Di Tang
Xiaofeng Wang
Weili Han
Xiangyu Liu
Kehuan Zhang
CVBM
AAML
51
103
0
13 Mar 2018
Stochastic Activation Pruning for Robust Adversarial Defense
Stochastic Activation Pruning for Robust Adversarial Defense
Guneet Singh Dhillon
Kamyar Azizzadenesheli
Zachary Chase Lipton
Jeremy Bernstein
Jean Kossaifi
Aran Khanna
Anima Anandkumar
AAML
58
546
0
05 Mar 2018
Obfuscated Gradients Give a False Sense of Security: Circumventing
  Defenses to Adversarial Examples
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples
Anish Athalye
Nicholas Carlini
D. Wagner
AAML
171
3,171
0
01 Feb 2018
CosFace: Large Margin Cosine Loss for Deep Face Recognition
CosFace: Large Margin Cosine Loss for Deep Face Recognition
Haobo Wang
Yitong Wang
Zheng Zhou
Xing Ji
Dihong Gong
Jin Zhou
Zhifeng Li
Wei Liu
CVBM
MQ
119
2,488
0
29 Jan 2018
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning
Xinyun Chen
Chang-rui Liu
Yue Liu
Kimberly Lu
D. Song
AAML
SILM
86
1,822
0
15 Dec 2017
MagNet and "Efficient Defenses Against Adversarial Attacks" are Not
  Robust to Adversarial Examples
MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples
Nicholas Carlini
D. Wagner
AAML
51
247
0
22 Nov 2017
VGGFace2: A dataset for recognising faces across pose and age
VGGFace2: A dataset for recognising faces across pose and age
Qiong Cao
Li Shen
Weidi Xie
Omkar M. Parkhi
Andrew Zisserman
CVBM
85
2,617
0
23 Oct 2017
EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial
  Examples
EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples
Pin-Yu Chen
Yash Sharma
Huan Zhang
Jinfeng Yi
Cho-Jui Hsieh
AAML
62
639
0
13 Sep 2017
BadNets: Identifying Vulnerabilities in the Machine Learning Model
  Supply Chain
BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain
Tianyu Gu
Brendan Dolan-Gavitt
S. Garg
SILM
88
1,758
0
22 Aug 2017
12
Next