{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:32:43Z","timestamp":1742916763772,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030881122"},{"type":"electronic","value":"9783030881139"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-88113-9_21","type":"book-chapter","created":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T19:04:24Z","timestamp":1632942264000},"page":"266-277","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Adversarial Attacks on Face Detection Algorithms Using Anti-facial Recognition T-Shirts"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7257-5952","authenticated-orcid":false,"given":"Ewa","family":"Lyko","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7764-1303","authenticated-orcid":false,"given":"Michal","family":"Kedziora","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,27]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/34.982883","volume":"24","author":"N Ahuja","year":"2002","unstructured":"Ahuja, N., Kriegman, D., Yang, M.: Detecting faces in images: a survey. IEEE Trans. Pattern Anal. Mach. Intell. 24, 34\u201358 (2002). https:\/\/doi.org\/10.1109\/34.982883","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"21_CR2","unstructured":"Bengio, S., Goodfellow, I., Kurakin, A.: Adversarial examples in the physical world (2016)"},{"key":"21_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11263-015-0806-0","volume":"115","author":"M Bernstein","year":"2015","unstructured":"Bernstein, M., et al.: ImageNet large scale visual recognition challenge. Int. J. Comput. Vis. 115, 1\u201342 (2015)","journal-title":"Int. J. Comput. Vis."},{"key":"21_CR4","unstructured":"Chen, H., et al.: Evading real-time person detectors by adversarial t-shirt (2019)"},{"key":"21_CR5","unstructured":"Darrell, T., Donahue, J., Girshick, R., Malik, J.: Rich feature hierarchies for accurate object detection and semantic segmentation (2014)"},{"key":"21_CR6","unstructured":"DeepAI: Facial Recognition API. https:\/\/deepai.org\/machine-learning-model\/facial-recognition. Accessed 02 Feb 2021"},{"key":"21_CR7","unstructured":"Divvala, S., Farhadi, A., Girshick, R., Redmon, J.: You only look once: unified, real-time object detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 779\u2013788 (2016)"},{"key":"21_CR8","doi-asserted-by":"publisher","unstructured":"Evtimov, I., et al.: Robust physical-world attacks on deep learning visual classification, pp. 1625\u20131634 (2018). https:\/\/doi.org\/10.1109\/CVPR.2018.00175","DOI":"10.1109\/CVPR.2018.00175"},{"key":"21_CR9","unstructured":"Face++: Facial recognition. https:\/\/www.faceplusplus.com. Accessed 02 Feb 2021"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Girshick, R.: Fast R-CNN (2015)","DOI":"10.1109\/ICCV.2015.169"},{"key":"21_CR11","unstructured":"Girshick, R., He, K., Ren, S., Sun, J.: Faster R-CNN: towards real-time object detection with region proposal networks (2016)"},{"key":"21_CR12","doi-asserted-by":"publisher","unstructured":"Goedeme, T., Thys, S., Rast, W.V.: Fooling automated surveillance cameras: adversarial patches to attack person detection, pp. 49\u201355 (2019). https:\/\/doi.org\/10.1109\/CVPRW.2019.00012","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"21_CR13","unstructured":"Guo, Y., Shi, Z., Ye, J., Zou, Z.: Object detection in 20 years: a survey (2019)"},{"key":"21_CR14","unstructured":"LinkedIn: Deepai. https:\/\/www.linkedin.com\/company\/deepai. Accessed 28 Mar 2021"},{"key":"21_CR15","unstructured":"Lujo, B., Mahmood, S., Reiter, M.K., Sruti, B.: Accessorize to a crime: real and stealthy attacks on state-of-the-art face recognition. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1528\u20131540. CCS 2016. Association for Computing Machinery, New York (2016)"},{"key":"21_CR16","unstructured":"Microsoft: Azure Cognitive Services. https:\/\/azure.microsoft.com\/en-us\/services\/cognitive-services. Accessed 02 Feb 2021"},{"key":"21_CR17","unstructured":"RedBubble: Adversarial Anti-Facial Recognition Invisibility Camouflage Classic T-Shirt. https:\/\/www.redbubble.com\/i\/t-shirt\/Adversarial-Anti-Facial-Recognition-Invisibility-Camouflage-by-el-em-cee\/48303486.IJ6L0.XYZ. Accessed 05 Apr 2021"},{"key":"21_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/3-540-47977-5_2","volume-title":"Computer Vision \u2014 ECCV 2002","author":"G Donato","year":"2002","unstructured":"Donato, G., Belongie, S.: Approximate Thin Plate Spline Mappings. In: Heyden, A., Sparr, G., Nielsen, M., Johansen, P. (eds.) ECCV 2002. LNCS, vol. 2352, pp. 21\u201331. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-47977-5_2"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Wei, F., Yang, X., Zhang, H., Zhu, J.: Design and interpretation of universal adversarial patches in face detection (2019)","DOI":"10.1007\/978-3-030-58520-4_11"}],"container-title":["Communications in Computer and Information Science","Advances in Computational Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-88113-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:02:37Z","timestamp":1725843757000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-88113-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030881122","9783030881139"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-88113-9_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"27 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Collective Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rhodos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccci2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccci.pwr.edu.pl\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"231","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}