Picture for Kazuya Kakizaki

Kazuya Kakizaki

Prompt Tuning for Audio Deepfake Detection: Computationally Efficient Test-time Domain Adaptation with Limited Target Dataset

Add code
Oct 13, 2024
Figure 1 for Prompt Tuning for Audio Deepfake Detection: Computationally Efficient Test-time Domain Adaptation with Limited Target Dataset
Figure 2 for Prompt Tuning for Audio Deepfake Detection: Computationally Efficient Test-time Domain Adaptation with Limited Target Dataset
Figure 3 for Prompt Tuning for Audio Deepfake Detection: Computationally Efficient Test-time Domain Adaptation with Limited Target Dataset
Figure 4 for Prompt Tuning for Audio Deepfake Detection: Computationally Efficient Test-time Domain Adaptation with Limited Target Dataset
Viaarxiv icon

Simultaneous Adversarial Attacks On Multiple Face Recognition System Components

Add code
Apr 11, 2023
Figure 1 for Simultaneous Adversarial Attacks On Multiple Face Recognition System Components
Figure 2 for Simultaneous Adversarial Attacks On Multiple Face Recognition System Components
Figure 3 for Simultaneous Adversarial Attacks On Multiple Face Recognition System Components
Figure 4 for Simultaneous Adversarial Attacks On Multiple Face Recognition System Components
Viaarxiv icon

Advancing Deep Metric Learning Through Multiple Batch Norms And Multi-Targeted Adversarial Examples

Add code
Dec 06, 2022
Viaarxiv icon

Powerful Physical Adversarial Examples Against Practical Face Recognition Systems

Add code
Mar 23, 2022
Figure 1 for Powerful Physical Adversarial Examples Against Practical Face Recognition Systems
Figure 2 for Powerful Physical Adversarial Examples Against Practical Face Recognition Systems
Figure 3 for Powerful Physical Adversarial Examples Against Practical Face Recognition Systems
Figure 4 for Powerful Physical Adversarial Examples Against Practical Face Recognition Systems
Viaarxiv icon

Universal Adversarial Spoofing Attacks against Face Recognition

Add code
Oct 02, 2021
Figure 1 for Universal Adversarial Spoofing Attacks against Face Recognition
Figure 2 for Universal Adversarial Spoofing Attacks against Face Recognition
Figure 3 for Universal Adversarial Spoofing Attacks against Face Recognition
Figure 4 for Universal Adversarial Spoofing Attacks against Face Recognition
Viaarxiv icon

On Brightness Agnostic Adversarial Examples Against Face Recognition Systems

Add code
Sep 29, 2021
Figure 1 for On Brightness Agnostic Adversarial Examples Against Face Recognition Systems
Figure 2 for On Brightness Agnostic Adversarial Examples Against Face Recognition Systems
Figure 3 for On Brightness Agnostic Adversarial Examples Against Face Recognition Systems
Figure 4 for On Brightness Agnostic Adversarial Examples Against Face Recognition Systems
Viaarxiv icon

Adversarial Image Translation: Unrestricted Adversarial Examples in Face Recognition Systems

Add code
May 27, 2019
Figure 1 for Adversarial Image Translation: Unrestricted Adversarial Examples in Face Recognition Systems
Figure 2 for Adversarial Image Translation: Unrestricted Adversarial Examples in Face Recognition Systems
Figure 3 for Adversarial Image Translation: Unrestricted Adversarial Examples in Face Recognition Systems
Figure 4 for Adversarial Image Translation: Unrestricted Adversarial Examples in Face Recognition Systems
Viaarxiv icon

Lightweight Lipschitz Margin Training for Certified Defense against Adversarial Examples

Add code
Nov 20, 2018
Figure 1 for Lightweight Lipschitz Margin Training for Certified Defense against Adversarial Examples
Figure 2 for Lightweight Lipschitz Margin Training for Certified Defense against Adversarial Examples
Viaarxiv icon

Differentially Private Analysis of Outliers

Add code
Jul 27, 2015
Figure 1 for Differentially Private Analysis of Outliers
Figure 2 for Differentially Private Analysis of Outliers
Figure 3 for Differentially Private Analysis of Outliers
Figure 4 for Differentially Private Analysis of Outliers
Viaarxiv icon