F. Schroff, D. Kalenichenko, and J. Philbin, “Facenet: A unified embedding for face recognition and clustering,” Proc. the IEEE conference on computer vision and pattern recognition, pp.815-823, 2015.
I.J. Goodfellow, J. Shlens, and C. Szegedy, “Explaining and harnessing adversarial examples,” 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings, eds. by Y. Bengio and Y. LeCun, pp.1-11, 2015. http://arxiv.org/abs/1412.6572
M. Pautov, G. Melnikov, E. Kaziakhmedov, K. Kireev, and A. Petiushko, “On adversarial patches: real-world attack on arcface-100 face recognition system,” 2019 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON)IEEE, pp.391-396 2019.
M. Sharif, S. Bhagavatula, L. Bauer, and M.K. Reiter, “Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition,” Proc. the 2016 acm sigsac conference on computer and communications security, pp.1528-1540, 2016.
R. Parmar, M. Kuribayashi, H. Takiwaki, and M.S. Raval, “On fooling facial recognition systems using adversarial patches,” Proc. IJCNN2022, pp.1-8, 2022.