Author of the publication

Model Inversion Attack against a Face Recognition System in a Black-Box Setting.

, , , and . APSIPA ASC, page 1800-1807. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Training-Free Method for Generating Motion Video Clones From A Still Image Considering Self-Occlusion of Human Body., , , , and . ICIP, page 509-513. IEEE, (2019)Recognizing ingredients at cutting process by integrating multimodal features., , , , , , and . CEA@ACM Multimedia, page 13-18. ACM, (2012)On-line Geospatial Term Extraction from Streaming Geotagged Tweets., , , and . BigMM, page 322-329. IEEE Computer Society, (2017)Investigation of a Method to Estimate Learners' Interest Level for Agent-Based Conversational e-Learning., , , and . IPMU (2), volume 298 of Communications in Computer and Information Science, page 425-433. Springer, (2012)Development of nodding detection system based on Active Appearance Model., , and . SII, page 400-405. IEEE, (2013)Machi-POS - point of sales system for restaurant district., , , , and . Int. J. Knowl. Web Intell., 3 (2): 130-162 (2012)Preventing Fake Information Generation Against Media Clone Attacks., , , , , , , , , and 2 other author(s). IEICE Trans. Inf. Syst., 104-D (1): 2-11 (2021)Generating Handwritten Character Clones from an Incomplete Seed Character Set using Collaborative Filtering., , , and . ICFHR, page 68-73. IEEE Computer Society, (2018)Extracting Real-World Observations from Microblog., , , and . BigMM, page 232-237. IEEE Computer Society, (2017)Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System., , , , and . KSII Trans. Internet Inf. Syst., 15 (3): 1100-1118 (2021)