[1]
“Generating Dual-Identity Face Impersonations with Generative Adversarial Networks: An Adversarial Attack Methodology”, ijaair, vol. 2, no. 10, pp. 1–8, Oct. 2025, Accessed: Mar. 03, 2026. [Online]. Available: https://aimjournals.com/index.php/ijaair/article/view/280