Author of the publication

Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches.

, , , , , , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps., , , , , , , and . ACM Trans. Cyber Phys. Syst., 3 (4): 36:1-36:21 (2019)Visualization of a data leak., , and . ISSA, page 1-8. IEEE, (2013)Proposed Model for a Cybersecurity Centre of Innovation for South Africa., , , and . HCC, volume 431 of IFIP Advances in Information and Communication Technology, page 293-306. Springer, (2014)On the viability of pro-active automated PII breach detection: A South African case study., , and . SAICSIT, page 251. ACM, (2014)Access Control, Key Management, and Trust for Emerging Wireless Body Area Networks., , , , and . Sensors, 23 (24): 9856 (December 2023)Towards Improving the Adoption and Usage of National Digital Identity Systems., , , , and . ASE, page 223:1-223:6. ACM, (2022)Simulating cyber security management: A gamified approach to executive decision making., , , and . ASE, page 222:1-222:8. ACM, (2022)Government Mobile Apps: Analysing Citizen Feedback via App Reviews., , , and . ASE, page 1858-1863. IEEE, (2023)Privacy-Preserving Data Generation and Sharing Using Identification Sanitizer., , , , , , and . WISE (2), volume 12343 of Lecture Notes in Computer Science, page 185-200. Springer, (2020)My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media., , , , , and . WISE (2), volume 10570 of Lecture Notes in Computer Science, page 528-539. Springer, (2017)