Accessorize to a Crime - Real and Stealthy Attacks on State-Of-The-Art Face Recognition
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Syllabus
Intro
Machine Learning Is Ubiquitous
What Do You See?
The Difference
What Are the Adversary's Capabilities? To generate attacks, attacker needs to know how changing input affects output
What's a (Deep) Neural Network?
Face Recognition . Applications: surveillance, access control...
Face Recognition: Our Attacks
Deep Face Recognition
Apply Changes to Face Only
Apply Changes to Eyeglasses
Experiments in Digital Environment
Smooth Transitions Natural images tend to be smooth
Printable Eyeglasses Chalenge: Cannot print all colors
Robust Perturbations
Putting All the Pieces Together - Physically realizable impersonation
Does This Work?
Experiment: Realized Impersonations
Impersonation Attacks Pose Real Risk!
Extensions (See Paper)
Conclusions
Taught by
ACM CCS
Related Courses
Deep Learning in Computer VisionHigher School of Economics via Coursera Visual Recognition & Understanding
University at Buffalo via Coursera Computer Vision Masterclass
Udemy الشبكات العصبونية الالتفافية
DeepLearning.AI via Coursera TensorFlow 101: Introduction to Deep Learning
Udemy