Picture for Inderjeet Singh

Inderjeet Singh

Knowledge Distillation-Empowered Digital Twin for Anomaly Detection

Add code
Sep 12, 2023
Figure 1 for Knowledge Distillation-Empowered Digital Twin for Anomaly Detection
Figure 2 for Knowledge Distillation-Empowered Digital Twin for Anomaly Detection
Figure 3 for Knowledge Distillation-Empowered Digital Twin for Anomaly Detection
Figure 4 for Knowledge Distillation-Empowered Digital Twin for Anomaly Detection
Viaarxiv icon

Simultaneous Adversarial Attacks On Multiple Face Recognition System Components

Add code
Apr 11, 2023
Figure 1 for Simultaneous Adversarial Attacks On Multiple Face Recognition System Components
Figure 2 for Simultaneous Adversarial Attacks On Multiple Face Recognition System Components
Figure 3 for Simultaneous Adversarial Attacks On Multiple Face Recognition System Components
Figure 4 for Simultaneous Adversarial Attacks On Multiple Face Recognition System Components
Viaarxiv icon

Advancing Deep Metric Learning Through Multiple Batch Norms And Multi-Targeted Adversarial Examples

Add code
Dec 06, 2022
Figure 1 for Advancing Deep Metric Learning Through Multiple Batch Norms And Multi-Targeted Adversarial Examples
Figure 2 for Advancing Deep Metric Learning Through Multiple Batch Norms And Multi-Targeted Adversarial Examples
Figure 3 for Advancing Deep Metric Learning Through Multiple Batch Norms And Multi-Targeted Adversarial Examples
Figure 4 for Advancing Deep Metric Learning Through Multiple Batch Norms And Multi-Targeted Adversarial Examples
Viaarxiv icon

Powerful Physical Adversarial Examples Against Practical Face Recognition Systems

Add code
Mar 23, 2022
Figure 1 for Powerful Physical Adversarial Examples Against Practical Face Recognition Systems
Figure 2 for Powerful Physical Adversarial Examples Against Practical Face Recognition Systems
Figure 3 for Powerful Physical Adversarial Examples Against Practical Face Recognition Systems
Figure 4 for Powerful Physical Adversarial Examples Against Practical Face Recognition Systems
Viaarxiv icon

Anomaly Detection using Capsule Networks for High-dimensional Datasets

Add code
Dec 28, 2021
Figure 1 for Anomaly Detection using Capsule Networks for High-dimensional Datasets
Figure 2 for Anomaly Detection using Capsule Networks for High-dimensional Datasets
Figure 3 for Anomaly Detection using Capsule Networks for High-dimensional Datasets
Figure 4 for Anomaly Detection using Capsule Networks for High-dimensional Datasets
Viaarxiv icon

On Brightness Agnostic Adversarial Examples Against Face Recognition Systems

Add code
Sep 29, 2021
Figure 1 for On Brightness Agnostic Adversarial Examples Against Face Recognition Systems
Figure 2 for On Brightness Agnostic Adversarial Examples Against Face Recognition Systems
Figure 3 for On Brightness Agnostic Adversarial Examples Against Face Recognition Systems
Figure 4 for On Brightness Agnostic Adversarial Examples Against Face Recognition Systems
Viaarxiv icon

Dodging Attack Using Carefully Crafted Natural Makeup

Add code
Sep 14, 2021
Figure 1 for Dodging Attack Using Carefully Crafted Natural Makeup
Figure 2 for Dodging Attack Using Carefully Crafted Natural Makeup
Figure 3 for Dodging Attack Using Carefully Crafted Natural Makeup
Figure 4 for Dodging Attack Using Carefully Crafted Natural Makeup
Viaarxiv icon

A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems

Add code
Jul 05, 2021
Figure 1 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 2 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 3 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Figure 4 for A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems
Viaarxiv icon