Research Article
[Retracted] Cloud Data Access Prevention Method in Face Recognition Technology Based on Computer Vision
Table 4
Experimental results of different networks in Print Attack library.
| ā | CNN | Add occlusion trained CNN | MRCNN |
| Detection of traditional attack methods | HTER (%) | 1.4 | 1.45 | 0.7 |
| Attack difficulty of adversarial samples | The mean minimum perturbation magnitude of the DeepFool method | 0.076 | 0.08 | 0.247 | The mean minimum disturbance amplitude of the ma method | 0.117 | 0.116 | 0.226 |
|
|