Search Results for author: Inderjeet Singh

Found 8 papers, 0 papers with code

Knowledge Distillation-Empowered Digital Twin for Anomaly Detection

no code implementations8 Sep 2023 Qinghua Xu, Shaukat Ali, Tao Yue, Zaimovic Nedim, Inderjeet Singh

However, constructing a DT for anomaly detection in TCMS necessitates sufficient training data and extracting both chronological and context features with high quality.

Anomaly Detection Knowledge Distillation +2

Simultaneous Adversarial Attacks On Multiple Face Recognition System Components

no code implementations11 Apr 2023 Inderjeet Singh, Kazuya Kakizaki, Toshinori Araki

In this work, we investigate the potential threat of adversarial examples to the security of face recognition systems.

Face Detection Face Recognition

Advancing Deep Metric Learning Through Multiple Batch Norms And Multi-Targeted Adversarial Examples

no code implementations29 Nov 2022 Inderjeet Singh, Kazuya Kakizaki, Toshinori Araki

Deep Metric Learning (DML) is a prominent field in machine learning with extensive practical applications that concentrate on learning visual similarities.

Metric Learning

Powerful Physical Adversarial Examples Against Practical Face Recognition Systems

no code implementations23 Mar 2022 Inderjeet Singh, Toshinori Araki, Kazuya Kakizaki

Notably, our smoothness loss results in a 1. 17 and 1. 97 times better mean attack success rate (ASR) in physical white-box and black-box attacks, respectively.

Face Recognition

Anomaly Detection using Capsule Networks for High-dimensional Datasets

no code implementations27 Dec 2021 Inderjeet Singh, Nandyala Hemachandra

To the best of our knowledge, this is the first instance where a capsule network is analyzed for the anomaly detection task in a high-dimensional complex data setting.

Anomaly Detection Binary Classification +3

On Brightness Agnostic Adversarial Examples Against Face Recognition Systems

no code implementations29 Sep 2021 Inderjeet Singh, Satoru Momiyama, Kazuya Kakizaki, Toshinori Araki

This paper introduces a novel adversarial example generation method against face recognition systems (FRSs).

Face Recognition

Dodging Attack Using Carefully Crafted Natural Makeup

no code implementations14 Sep 2021 Nitzan Guetta, Asaf Shabtai, Inderjeet Singh, Satoru Momiyama, Yuval Elovici

Deep learning face recognition models are used by state-of-the-art surveillance systems to identify individuals passing through public areas (e. g., airports).

Face Recognition

Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems

no code implementations5 Jul 2021 Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai

Using the extension, security practitioners can apply attack graph analysis methods in environments that include ML components; thus, providing security practitioners with a methodological and practical tool for evaluating the impact and quantifying the risk of a cyberattack targeting an ML production system.

BIG-bench Machine Learning Graph Generation

Cannot find the paper you are looking for? You can Submit a new open access paper.