Loading Now

Summary of Transferable Adversarial Face Attack with Text Controlled Attribute, by Wenyun Li et al.


Transferable Adversarial Face Attack with Text Controlled Attribute

by Wenyun Li, Zheng Zhang, Xiangyuan Lan, Dongmei Jiang

First submitted to arxiv on: 16 Dec 2024

Categories

  • Main: Computer Vision and Pattern Recognition (cs.CV)
  • Secondary: Artificial Intelligence (cs.AI)

     Abstract of paper      PDF of paper


GrooveSquid.com Paper Summaries

GrooveSquid.com’s goal is to make artificial intelligence research accessible by summarizing AI papers in simpler terms. Each summary below covers the same AI paper, written at different levels of difficulty. The medium difficulty and low difficulty versions are original summaries written by GrooveSquid.com, while the high difficulty version is the paper’s original abstract. Feel free to learn from the version that suits you best!

Summary difficulty Written by Summary
High Paper authors High Difficulty Summary
Read the original abstract here
Medium GrooveSquid.com (original content) Medium Difficulty Summary
This paper proposes a novel Text Controlled Attribute Attack (TCA^2) to generate photorealistic adversarial impersonation faces guided by natural language. The method uses a category-level personal softmax vector to precisely guide impersonation attacks, and combines data and model augmentation strategies for transferable attacks on unknown target models. A generative model, Style-GAN, is used to synthesize impersonated faces with desired attributes. Experiments on two high-resolution face recognition datasets demonstrate the effectiveness of TCA^2, which can generate natural text-guided adversarial impersonation faces with high transferability. The method is also evaluated on real-world face recognition systems, such as Face++ and Aliyun.
Low GrooveSquid.com (original content) Low Difficulty Summary
This paper creates fake faces that look like someone else’s, but only if you tell it what kind of person the fake face should be (e.g., “a young woman”). This is useful for testing security cameras or other facial recognition systems. The new method works by using a special type of math to change how a computer sees a face. It can make the fake faces look really real, and it’s good at fooling most computers. The paper shows that this method can work on real-world cameras, which could be useful for testing or even causing mischief.

Keywords

» Artificial intelligence  » Face recognition  » Gan  » Generative model  » Softmax  » Transferability