Return to Article Details Generating Dual-Identity Face Impersonations with Generative Adversarial Networks: An Adversarial Attack Methodology Download Download PDF