Accessorize to a Crime - Real and Stealthy Attacks on State-Of-The-Art Face Recognition
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Syllabus
Intro
Machine Learning Is Ubiquitous
What Do You See?
The Difference
What Are the Adversary's Capabilities? To generate attacks, attacker needs to know how changing input affects output
What's a (Deep) Neural Network?
Face Recognition . Applications: surveillance, access control...
Face Recognition: Our Attacks
Deep Face Recognition
Apply Changes to Face Only
Apply Changes to Eyeglasses
Experiments in Digital Environment
Smooth Transitions Natural images tend to be smooth
Printable Eyeglasses Chalenge: Cannot print all colors
Robust Perturbations
Putting All the Pieces Together - Physically realizable impersonation
Does This Work?
Experiment: Realized Impersonations
Impersonation Attacks Pose Real Risk!
Extensions (See Paper)
Conclusions
Taught by
ACM CCS
Related Courses
Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor BrowserAssociation for Computing Machinery (ACM) via YouTube DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Association for Computing Machinery (ACM) via YouTube SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube Game of Decoys - Optimal Decoy Routing Through Game Theory
Association for Computing Machinery (ACM) via YouTube PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube