Completed
Robust Perturbations
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Accessorize to a Crime - Real and Stealthy Attacks on State-Of-The-Art Face Recognition
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Machine Learning Is Ubiquitous
- 3 What Do You See?
- 4 The Difference
- 5 What Are the Adversary's Capabilities? To generate attacks, attacker needs to know how changing input affects output
- 6 What's a (Deep) Neural Network?
- 7 Face Recognition . Applications: surveillance, access control...
- 8 Face Recognition: Our Attacks
- 9 Deep Face Recognition
- 10 Apply Changes to Face Only
- 11 Apply Changes to Eyeglasses
- 12 Experiments in Digital Environment
- 13 Smooth Transitions Natural images tend to be smooth
- 14 Printable Eyeglasses Chalenge: Cannot print all colors
- 15 Robust Perturbations
- 16 Putting All the Pieces Together - Physically realizable impersonation
- 17 Does This Work?
- 18 Experiment: Realized Impersonations
- 19 Impersonation Attacks Pose Real Risk!
- 20 Extensions (See Paper)
- 21 Conclusions