Latest papers

3 papers
defense arXiv Apr 16, 2026 · 5w ago

Find the Differences: Differential Morphing Attack Detection vs Face Recognition

Una M. Kelly, Luuk J. Spreeuwers, Raymond N.J. Veldhuis · University of Twente · University of Münster +1 more

Shows face recognition systems can detect morphing attacks and proposes new thresholds to limit vulnerability to unknown morphs

Input Manipulation Attack vision
PDF
attack arXiv Feb 6, 2026 · Feb 2026

Perturbing the Phase: Analyzing Adversarial Robustness of Complex-Valued Neural Networks

Florian Eilers, Christof Duhme, Xiaoyi Jiang · University of Münster

Novel Phase Attacks targeting complex-valued neural network inputs outperform magnitude-only and standard adversarial attacks at causing misclassification

Input Manipulation Attack vision
PDF Code
benchmark arXiv Feb 6, 2026 · Feb 2026

Exploring Sparsity and Smoothness of Arbitrary $\ell_p$ Norms in Adversarial Attacks

Florian Eilers, Christof Duhme, Xiaoyi Jiang · University of Münster

Benchmarks sparsity and smoothness of ℓp adversarial perturbations, showing p∈[1.3,1.5] outperforms standard ℓ1/ℓ2 choices across architectures

Input Manipulation Attack vision
PDF