References
- 김형일, 문진영, 박종열, "딥러닝 기반 고성능 얼굴인식 기술 동향", 전자통신동향분석, 33(4), pp. 43-53, 2018 https://doi.org/10.22648/ETRI.2018.J.330405
- M. Wang, W. Deng, "Deep Face Recognition: A Survey," arXiv preprint arXiv:1804.06655, 2018.
- W. Liu, Y. Wen, Z. Yu, and M. Yang, "Large-Margin Softmax Loss for Convolutional Neural Networks," Proceedings of the 33rd International Conference on Machine Learning, pp. 507-516, 2016.
- W. Liu, Y. Wen, Z. Yu, M. Li, B. Raj, and L. Song, "SphereFace: Deep Hypersphere Embedding for Face Recognition," Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, IEEE, pp. 212-220, 2017.
- H. Wang, Y. Wang, Z. Zhou, X. Ji, D. Gong, J. Zhou, and W. Liu, "CosFace: Large Margin Cosine Loss for Deep Face Recognition," Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, IEEE, pp. 5265-5274, 2018.
- Y. Zheng, D.K. Pal, and M. Savvides, "Ring loss: Convex Feature Normalization for Face Recognition," Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, IEEE, pp. 5089-5097, 2018.
- J. Deng, J. Guo, N. Xue, and S. Zafeiriou, "ArcFace: Additive Angular Margin Loss for Deep Face Recognition," arXiv preprint arXiv:1801.07698, 2018.
- G. Hinton, L. Deng, D. Yu, G. Dahl, A.R. Mohamed, N. Jaitly, and T. Sainath, "Deep Neural Networks for Acoustic Modeling in Speech Recognition," IEEE Signal Processing Magazine, 29(6), pp. 82-97, 2012. https://doi.org/10.1109/MSP.2012.2205597
- S. Potluri and C. Diedrich, "Accelerated Deep Neural Networks for Enhanced Intrusion Detection System," 2016 IEEE 21st International Conference on Emerging technologies and Factory Automation, pp. 1-8, 2016.
- C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus, "Intriguing Properties of Neural Networks," arXiv preprint arXiv:1312.6199, 2013.
- K. Eykholt, I. Evtimov, E. Fernandes, B. Li, A. Rahmati, C. Xiao, and D. Song, "Robust Physical-World Attacks on Deep Learning Visual Classification," Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, IEEE, pp. 1625-1634, 2018.
- N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z.B. Celik, and A. Swami, "The Limitations of Deep Learning in Adversarial Settings," 2016 IEEE European Symposium on Security and Privacy, IEEE, pp. 372-387, 2016.
- 권현, 윤현수, 최대선, "Evasion attack에 대한 인공지능 보안 이슈," 정보과학회지, 36(2), pp. 32-36, 2018.
- I. Goodfellow, J. Shlens, and C. Szegedy, "Explaining and Harnessing Adversarial Examples," arXiv preprint arXiv:1412.6572, 2014.
- S.M Moosavi-Dezfooli, A. Fawzi, and P. Frossard, "Deepfool: a Simple and Accurate Method to Fool Deep Neural Networks," Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, IEEE, pp. 2574-2582, 2016.
- N. Carlini, D. Wagner, "Towards Evaluating the Robustness of Neural Networks," 2017 IEEE Symposium on Security and Privacy, IEEE, pp. 39-57, 2017.
- K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, "Joint Face Detection and Alignment using Multi-task Cascaded Convolutional Networks," IEEE Signal Processing Letters, 23(10), pp. 1499-1503, 2016. https://doi.org/10.1109/LSP.2016.2603342
- A. Bulat and G. Tzimiropoulos, "How Far are We from Solving The 2D & 3D Face Alignment Problem?(and a Dataset of 230,000 3D Facial Landmarks)," Proceedings of the IEEE International Conference on Computer Vision, IEEE, pp. 1021-1030, 2017.
- K. He, X. Zhang, S.Ren, and J. Sun, "Identity Mappings in Deep Residual Networks," European Conference on Computer Vision, Springer, pp. 630-645, 2016.
- M.T. Ribeiro, S. Singh, and C. Guestrin, "Why Should I Trust You?: Explaining the Predictions of Any Classifier," Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, pp. 1135-1144, 2016.