UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 9 Issue 5
May-2022
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2205781


Registration ID:
402711

Page Number

g688-g697

Share This Article


Jetir RMS

Title

Attack Analysis of Face Recognition Authentication Systems Using Basic Iterative Method (BIM)

Abstract

Machine Learning models are used for a variety of tasks, such as picture categorization, virus detection, and network intrusion detection. However, subsequent studies have shown that even the most advanced deep neural networks, which excel at such tasks, are subject to a bug. Adversarial Examples are a type of harmful input. These are non-random inputs that are nearly indistinguishable from natural data but are incorrectly categorized. In this paper, we attempt to investigate the presence of adversarial instances and highlight some of the numerous approaches developed to exploit deep neural network flaws. over time and give an analysis of such attacks as a subset of ImageNet's visually distinguishable classifications.

Key Words

Adversarial Examples, virus detection, Machine Learning, deep neural networks.

Cite This Article

"Attack Analysis of Face Recognition Authentication Systems Using Basic Iterative Method (BIM)", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.9, Issue 5, page no.g688-g697, May-2022, Available :http://www.jetir.org/papers/JETIR2205781.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Attack Analysis of Face Recognition Authentication Systems Using Basic Iterative Method (BIM)", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.9, Issue 5, page no. ppg688-g697, May-2022, Available at : http://www.jetir.org/papers/JETIR2205781.pdf

Publication Details

Published Paper ID: JETIR2205781
Registration ID: 402711
Published In: Volume 9 | Issue 5 | Year May-2022
DOI (Digital Object Identifier):
Page No: g688-g697
Country: Phagwara, Punjab, India .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000253

Print This Page

Current Call For Paper

Jetir RMS