1 code implementation • 24 Aug 2022 • Dongbin Na, Sangwoo Ji, Jong Kim
First, we demonstrate that our targeted attack method is query-efficient to produce unrestricted adversarial examples for a facial identity recognition model that contains 307 identities.