共 50 条
- [42] Person Authentication Using Face Detection WCECS 2008: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2008, : 1166 - 1171
- [43] Face authentication using the trace transform 2003 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS, 2003, : 305 - 312
- [44] Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models 45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 807 - 825
- [46] Poisoning Attacks to Graph-Based Recommender Systems 34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 381 - 392
- [47] Data Poisoning Attacks Against Federated Learning Systems COMPUTER SECURITY - ESORICS 2020, PT I, 2020, 12308 : 480 - 501
- [48] Towards Data Poisoning Attacks in Crowd Sensing Systems PROCEEDINGS OF THE 2018 THE NINETEENTH INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING (MOBIHOC '18), 2018, : 111 - 120
- [49] Multi Model Personal Authentication Using Finger Vein and Face Images (MPAFFI) 2014 INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2014, : 339 - 344
- [50] Detecting Poisoning Attacks on Hierarchical Malware Classification Systems CYBER SENSING 2017, 2017, 10185