usenix security '23 - fairness properties of face recognition and obfuscation systems
Published 7 months ago • 37 plays • Length 10:20Download video MP4
Download video MP3
Similar videos
-
10:34
usenix security '23 - face-auditor: data auditing in facial recognition systems
-
10:29
usenix security '23 - towards targeted obfuscation of adversarial unsafe images using...
-
11:16
usenix security '23 - unganable: defending against gan-based face manipulation
-
9:29
usenix security '23 - unique identification of 50,000 virtual reality users from head & hand...
-
12:58
usenix security '23 - infinitygauntlet: expose smartphone fingerprint authentication to...
-
11:31
usenix security '23 - eye-shield: real-time protection of mobile device screen information from...
-
9:48
usenix security '22 - seeing is living? rethinking the security of facial liveness verification
-
5:47
demo for phishllm (usenix security'24)
-
54:56
facial recognition x smart security -empowering smart aiot applications
-
9:23
is facial recognition and fingerprint id safe?
-
10:39
usenix security '23 - the writing on the wall and 3d digital twins: personal information in..
-
12:58
usenix security '23 - remote attacks on speech recognition systems using sound from power supply
-
14:29
usenix security '23 - tap: transparent and privacy-preserving data services
-
13:39
usenix security '23 - person re-identification in 3d space: a wifi vision-based approach
-
10:18
usenix security '23 - qfa2sr: query-free adversarial transfer attacks to speaker recognition systems
-
11:30
usenix security '23 - how to bind anonymous credentials to humans
-
12:07
usenix security '23 - investigating verification behavior and perceptions of visual digital...
-
12:04
usenix security '20 - fawkes: protecting privacy against unauthorized deep learning models
-
11:32
usenix security '22 - foap: fine-grained open-world android app fingerprinting
-
11:30
usenix security '23 - homespy: the invisible sniffer of infrared remote control of smart tvs
-
12:03
usenix security '23 - know your cybercriminal: evaluating attacker preferences by measuring...