Adversarial face examples possess two critical properties: Visual Qualit...
Adversarial attacks aim to disturb the functionality of a target system ...
Face recognition (FR) models can be easily fooled by adversarial example...
This paper presents a summary of the DFGC 2021 competition. DeepFake
tec...
Knowledge distillation can lead to deploy-friendly networks against the
...
It is well known that attention mechanisms can effectively improve the
p...