1 code implementation • 11 Jan 2022 • Hanrui Wang, Shuo Wang, Zhe Jin, Yandan Wang, Cunjian Chen, Massimo Tistarell
This technique applies to both white-box and gray-box attacks against authentication systems that determine genuine or imposter users using the dissimilarity score.