News
To evaluate the vulnerability of face recognition models, we explore more threatening impersonation attacks under the black-box setting and design a strict evaluation metric that aligns with the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results