ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2003.08861
  4. Cited By
Face-Off: Adversarial Face Obfuscation
v1v2 (latest)

Face-Off: Adversarial Face Obfuscation

Proceedings on Privacy Enhancing Technologies (PoPETs), 2020
19 March 2020
Varun Chandrasekaran
Chuhan Gao
Brian Tang
Kassem Fawaz
S. Jha
Suman Banerjee
    PICV
ArXiv (abs)PDFHTML

Papers citing "Face-Off: Adversarial Face Obfuscation"

27 / 27 papers shown
Make Identity Unextractable yet Perceptible: Synthesis-Based Privacy Protection for Subject Faces in Photos
Make Identity Unextractable yet Perceptible: Synthesis-Based Privacy Protection for Subject Faces in Photos
Tao Wang
Y. Zhang
Xiangli Xiao
Kun Xu
Lin Yuan
Wenying Wen
Yuming Fang
PICV
296
0
0
14 Sep 2025
FairDeFace: Evaluating the Fairness and Adversarial Robustness of Face Obfuscation Methods
FairDeFace: Evaluating the Fairness and Adversarial Robustness of Face Obfuscation Methods
Seyyed Mohammad Sadegh Moosavi Khorzooghi
Poojitha Thota
Mohit Singhal
Abolfazl Asudeh
Gautam Das
Shirin Nilizadeh
AAML
233
1
0
11 Mar 2025
Data Defenses Against Large Language Models
Data Defenses Against Large Language Models
William Agnew
Harry H. Jiang
Cella Sum
Maarten Sap
Sauvik Das
AAML
306
2
0
17 Oct 2024
Image Scaling Attack Simulation: A Measure of Stealth and Detectability
Image Scaling Attack Simulation: A Measure of Stealth and Detectability
Devon A. Kelly
Sarah A. Flanery
Christiana Chamon
AAML
325
2
0
14 Aug 2024
Towards Robust Vision Transformer via Masked Adaptive Ensemble
Towards Robust Vision Transformer via Masked Adaptive Ensemble
Fudong Lin
Jiadong Lou
Xu Yuan
Nianfeng Tzeng
ViTAAML
363
3
0
22 Jul 2024
Mask-up: Investigating Biases in Face Re-identification for Masked Faces
Mask-up: Investigating Biases in Face Re-identification for Masked Faces
Siddharth D. Jaiswal
Ankit Kr. Verma
Animesh Mukherjee
273
0
0
21 Feb 2024
Mendata: A Framework to Purify Manipulated Training Data
Mendata: A Framework to Purify Manipulated Training Data
Zonghao Huang
Neil Zhenqiang Gong
Michael K. Reiter
338
0
0
03 Dec 2023
Facial Data Minimization: Shallow Model as Your Privacy Filter
Facial Data Minimization: Shallow Model as Your Privacy Filter
Yuwen Pu
Jiahao Chen
Jiayu Pan
Hao li
Diqun Yan
Xuhong Zhang
R. Beyah
PICV
356
4
0
24 Oct 2023
Group-based Robustness: A General Framework for Customized Robustness in
  the Real World
Group-based Robustness: A General Framework for Customized Robustness in the Real WorldNetwork and Distributed System Security Symposium (NDSS), 2023
Weiran Lin
Keane Lucas
Neo Eyal
Lujo Bauer
Michael K. Reiter
Mahmood Sharif
OODAAML
316
1
0
29 Jun 2023
FACE-AUDITOR: Data Auditing in Facial Recognition Systems
FACE-AUDITOR: Data Auditing in Facial Recognition SystemsUSENIX Security Symposium (USENIX Security), 2023
Min Chen
Zhikun Zhang
Tianhao Wang
Michael Backes
Yang Zhang
CVBM
267
25
0
05 Apr 2023
Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models
Glaze: Protecting Artists from Style Mimicry by Text-to-Image ModelsUSENIX Security Symposium (USENIX Security), 2023
Shawn Shan
Jenna Cryan
Emily Wenger
Haitao Zheng
Rana Hanocka
Ben Y. Zhao
WIGM
579
263
0
08 Feb 2023
StyleGAN as a Utility-Preserving Face De-identification Method
StyleGAN as a Utility-Preserving Face De-identification MethodProceedings on Privacy Enhancing Technologies (PoPETs), 2022
Seyyed Mohammad Sadegh Moosavi Khorzooghi
Shirin Nilizadeh
PICVCVBM
287
5
0
05 Dec 2022
Data Isotopes for Data Provenance in DNNs
Data Isotopes for Data Provenance in DNNsProceedings on Privacy Enhancing Technologies (PoPETs), 2022
Emily Wenger
Xiuyu Li
Ben Y. Zhao
Vitaly Shmatikov
244
17
0
29 Aug 2022
ReFace: Real-time Adversarial Attacks on Face Recognition Systems
ReFace: Real-time Adversarial Attacks on Face Recognition Systems
Shehzeen Samarah Hussain
Todd P. Huster
Chris Mesterharm
Paarth Neekhara
Kevin R. An
Malhar Jere
Harshvardhan Digvijay Sikka
F. Koushanfar
AAML
277
7
0
09 Jun 2022
Meta-Cognition. An Inverse-Inverse Reinforcement Learning Approach for
  Cognitive Radars
Meta-Cognition. An Inverse-Inverse Reinforcement Learning Approach for Cognitive RadarsFusion (FUSION), 2022
Kunal Pattanayak
Vikram Krishnamurthy
Christopher Berry
304
15
0
03 May 2022
How Well Do My Results Generalize Now? The External Validity of Online
  Privacy and Security Surveys
How Well Do My Results Generalize Now? The External Validity of Online Privacy and Security Surveys
Jenny Tang
Eleanor Birrell
Ada Lerner
936
28
0
28 Feb 2022
SoK: Anti-Facial Recognition Technology
SoK: Anti-Facial Recognition Technology
Emily Wenger
Shawn Shan
Haitao Zheng
Ben Y. Zhao
PICV
278
19
0
08 Dec 2021
Two-Face: Adversarial Audit of Commercial Face Recognition Systems
Two-Face: Adversarial Audit of Commercial Face Recognition Systems
S. Jaiswal
K. Duggirala
A. Dash
Animesh Mukherjee
MLAUAAML
247
15
0
17 Nov 2021
Addressing Privacy Threats from Machine Learning
Addressing Privacy Threats from Machine Learning
Mary Anne Smart
149
3
0
25 Oct 2021
Fairness Properties of Face Recognition and Obfuscation Systems
Fairness Properties of Face Recognition and Obfuscation SystemsUSENIX Security Symposium (USENIX Security), 2021
Harrison Rosenberg
Brian Tang
Kassem Fawaz
S. Jha
PICV
227
18
0
05 Aug 2021
Adversarial for Good? How the Adversarial ML Community's Values Impede
  Socially Beneficial Uses of Attacks
Adversarial for Good? How the Adversarial ML Community's Values Impede Socially Beneficial Uses of Attacks
Kendra Albert
Maggie K. Delano
B. Kulynych
Ramnath Kumar
AAML
503
5
0
11 Jul 2021
Data Poisoning Won't Save You From Facial Recognition
Data Poisoning Won't Save You From Facial RecognitionInternational Conference on Learning Representations (ICLR), 2021
Evani Radiya-Dixit
Sanghyun Hong
Nicholas Carlini
Florian Tramèr
AAMLPICV
284
67
0
28 Jun 2021
Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities
  in Machine Learning Systems
Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning SystemsInternational Conference on Machine Learning (ICML), 2021
Yue Gao
Ilia Shumailov
Kassem Fawaz
AAML
525
12
0
18 Apr 2021
Towards a Robust and Trustworthy Machine Learning System Development: An
  Engineering Perspective
Towards a Robust and Trustworthy Machine Learning System Development: An Engineering PerspectiveJournal of Information Security and Applications (JISA), 2021
Pulei Xiong
Scott Buffett
Shahrear Iqbal
Philippe Lamontagne
M. Mamun
Heather Molyneaux
OOD
413
19
0
08 Jan 2021
Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks,
  and Defenses
Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and DefensesIEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2020
Micah Goldblum
Dimitris Tsipras
Chulin Xie
Xinyun Chen
Avi Schwarzschild
Basel Alomair
Aleksander Madry
Yue Liu
Tom Goldstein
SILM
620
383
0
18 Dec 2020
FoggySight: A Scheme for Facial Lookup Privacy
FoggySight: A Scheme for Facial Lookup PrivacyProceedings on Privacy Enhancing Technologies (PoPETs), 2020
Ivan Evtimov
Pascal Sturmfels
Tadayoshi Kohno
PICVFedML
352
26
0
15 Dec 2020
Ulixes: Facial Recognition Privacy with Adversarial Machine Learning
Ulixes: Facial Recognition Privacy with Adversarial Machine LearningProceedings on Privacy Enhancing Technologies (PoPETs), 2020
Thomas Cilloni
Wei Wang
Charles Walter
Charles Fleming
PICVAAML
274
9
0
20 Oct 2020
1
Page 1 of 1