Picture for Chris Mesterharm

Chris Mesterharm

ReFace: Real-time Adversarial Attacks on Face Recognition Systems

Add code
Jun 09, 2022
Figure 1 for ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Figure 2 for ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Figure 3 for ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Figure 4 for ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Viaarxiv icon

Privacy Leakage Avoidance with Switching Ensembles

Add code
Nov 18, 2019
Figure 1 for Privacy Leakage Avoidance with Switching Ensembles
Figure 2 for Privacy Leakage Avoidance with Switching Ensembles
Figure 3 for Privacy Leakage Avoidance with Switching Ensembles
Figure 4 for Privacy Leakage Avoidance with Switching Ensembles
Viaarxiv icon

Membership Model Inversion Attacks for Deep Networks

Add code
Oct 09, 2019
Figure 1 for Membership Model Inversion Attacks for Deep Networks
Figure 2 for Membership Model Inversion Attacks for Deep Networks
Figure 3 for Membership Model Inversion Attacks for Deep Networks
Figure 4 for Membership Model Inversion Attacks for Deep Networks
Viaarxiv icon

A Random Subspace Technique That Is Resistant to a Limited Number of Features Corrupted by an Adversary

Add code
Feb 19, 2019
Figure 1 for A Random Subspace Technique That Is Resistant to a Limited Number of Features Corrupted by an Adversary
Figure 2 for A Random Subspace Technique That Is Resistant to a Limited Number of Features Corrupted by an Adversary
Figure 3 for A Random Subspace Technique That Is Resistant to a Limited Number of Features Corrupted by an Adversary
Figure 4 for A Random Subspace Technique That Is Resistant to a Limited Number of Features Corrupted by an Adversary
Viaarxiv icon