Accessorize to a Crime - Real and Stealthy Attacks on State-Of-The-Art Face Recognition
Association for Computing Machinery (ACM) via YouTube
Overview
Syllabus
Intro
Machine Learning Is Ubiquitous
What Do You See?
The Difference
What Are the Adversary's Capabilities? To generate attacks, attacker needs to know how changing input affects output
What's a (Deep) Neural Network?
Face Recognition . Applications: surveillance, access control...
Face Recognition: Our Attacks
Deep Face Recognition
Apply Changes to Face Only
Apply Changes to Eyeglasses
Experiments in Digital Environment
Smooth Transitions Natural images tend to be smooth
Printable Eyeglasses Chalenge: Cannot print all colors
Robust Perturbations
Putting All the Pieces Together - Physically realizable impersonation
Does This Work?
Experiment: Realized Impersonations
Impersonation Attacks Pose Real Risk!
Extensions (See Paper)
Conclusions
Taught by
ACM CCS