[1]
“Generating Dual-Identity Face Impersonations with Generative Adversarial Networks: An Adversarial Attack Methodology”, ijaair, vol. 2, no. 10, pp. 1–8, Oct. 2025, Accessed: Dec. 13, 2025. [Online]. Available: https://aimjournals.com/index.php/ijaair/article/view/280