{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:16:13Z","timestamp":1767183373580,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031212796"},{"type":"electronic","value":"9783031212802"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-21280-2_11","type":"book-chapter","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:30:15Z","timestamp":1668760215000},"page":"197-212","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Sparse Attack on Skeleton-Based Human Action Recognition for Internet of Video Things Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9627-3083","authenticated-orcid":false,"given":"Yinqin","family":"Huang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2860-4589","authenticated-orcid":false,"given":"Cheng","family":"Dai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0172-9958","authenticated-orcid":false,"given":"Wei-Che","family":"Chien","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,19]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.jpdc.2019.03.003","volume":"130","author":"X Wang","year":"2019","unstructured":"Wang, X., Li, J., Kuang, X., Tan, Y.-A., Li, J.: The security of machine learning in an adversarial setting: a survey. J. Parallel Distrib. Comput. 130, 12\u201323 (2019)","journal-title":"J. Parallel Distrib. Comput."},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Karim, F., Majumdar, S., Darabi, H.: Adversarial attacks on time series. IEEE Trans. Pattern Anal. Mach. Intell. 1 (2020)","DOI":"10.1109\/TPAMI.2020.2986319"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Ismail Fawaz, H., Forestier, G., Weber, J., Idoumghar, L., Muller, P.-A.: Adversarial attacks on deep neural networks for time series classification. In: 2019 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138 (2019)","DOI":"10.1109\/IJCNN.2019.8851936"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"3959","DOI":"10.1109\/TIP.2019.2907048","volume":"28","author":"Q Nie","year":"2019","unstructured":"Nie, Q., Wang, J., Wang, X., Liu, Y.: View-invariant human action recognition based on a 3D Bio-constrained skeleton model. IEEE Trans. Image Process. 28, 3959\u20133972 (2019)","journal-title":"IEEE Trans. Image Process."},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/TAI.2021.3076974","volume":"2","author":"T Ahmad","year":"2021","unstructured":"Ahmad, T., Jin, L., Zhang, X., Lai, S., Tang, G., Lin, L.: Graph convolutional neural network for human action recognition: a comprehensive survey. IEEE Trans. Artif. Intell. 2, 128\u2013145 (2021)","journal-title":"IEEE Trans. Artif. Intell."},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Huang, X., et al.: A survey of safety and trustworthiness of deep neural networks: verification, testing, adversarial attack and defence, and interpretability. Comput. Sci. Rev. 37 (2020)","DOI":"10.1016\/j.cosrev.2020.100270"},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1016\/j.neunet.2020.09.018","volume":"132","author":"X Bai","year":"2020","unstructured":"Bai, X., Yang, M., Liu, Z.: On the robustness of skeleton detection against adversarial attacks. Neural Netw. 132, 416\u2013427 (2020)","journal-title":"Neural Netw."},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Wang, H., et al.: Understanding the robustness of skeleton-based action recognition under adversarial attack. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 14656\u201314665 (2021)","DOI":"10.1109\/CVPR46437.2021.01442"},{"key":"11_CR9","unstructured":"Liu, J., Akhtar, N., Mian, A.: Adversarial attack on skeleton-based human action recognition. In: IEEE Transactions on Neural Networks and Learning Systems, pp. 1\u201314 (2020)"},{"key":"11_CR10","unstructured":"Tram\u00e8r, F., Kurakin, A., Papernot, N., Goodfellow, I., Boneh, D., McDaniel, P.: Ensemble adversarial training: attacks and defenses. In: Proceedings of the International Conference on Learning Representations (2018)"},{"key":"11_CR11","unstructured":"M\u00fcller, M., R\u00f6der, T., Clausen, M., Eberhardt, B., Kr\u00fcger, B., Weber, A.: Documentation Mocap Database HDM05. Technical Report CG-2007-2 (2007)"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Shahroudy, A., Liu, J., Ng, T.-T., Wang, G.: NTU RGB+D: a large scale dataset for 3D human activity analysis. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1010\u20131019 (2016)","DOI":"10.1109\/CVPR.2016.115"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Li, W., Wen, L., Chang, M.-C., Nam Lim, S., Lyu, S.: Adaptive RNN tree for large-scale human action recognition. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 1444\u20131452 (2017)","DOI":"10.1109\/ICCV.2017.161"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"3007","DOI":"10.1109\/TPAMI.2017.2771306","volume":"40","author":"J Liu","year":"2017","unstructured":"Liu, J., Shahroudy, A., Xu, D., Kot, A.C., Wang, G.: Skeleton-based action recognition using spatio-temporal LSTM network with trust gates. IEEE Trans. Pattern Anal. Mach. Intell. 40, 3007\u20133021 (2017)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"22901","DOI":"10.1007\/s11042-018-5642-0","volume":"77","author":"B Li","year":"2018","unstructured":"Li, B., He, M., Dai, Y., Cheng, X., Chen, Y.: 3d skeleton based action recognition by video-domain translation-scale invariant mapping and multi-scale dilated CNN. Multimed. Tools Appl. 77, 22901\u201322921 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Zhu, A., et al.: Exploring a rich spatial-temporal dependent relational model for skeleton-based action recognition by bidirectional LSTM-CNN. Neurocomputing 414, 90\u2013100 (2020)","DOI":"10.1016\/j.neucom.2020.07.068"},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MMUL.2012.24","volume":"19","author":"Z Zhang","year":"2012","unstructured":"Zhang, Z.: Microsoft kinect sensor and its effect. IEEE Multimed. 19, 4\u201310 (2012)","journal-title":"IEEE Multimed."},{"key":"11_CR18","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1109\/TPAMI.2019.2929257","volume":"43","author":"Z Cao","year":"2021","unstructured":"Cao, Z., Hidalgo, G., Simon, T., Wei, S.-E., Sheikh, Y.: OpenPose: realtime multi-person 2D pose estimation using part affinity fields. IEEE Trans. Pattern Anal. Mach. Intell. 43, 172\u2013186 (2021)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Yan, S., Xiong, Y., Lin, D.: Spatial temporal graph convolutional networks for skeleton-based action recognition. In: Proceedings of the AAAI Conference on Artificial Intelligence (2018)","DOI":"10.1609\/aaai.v32i1.12328"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Li, M., Chen, S., Chen, X., Zhang, Y., Wang, Y., Tian, Q.: Actional-structural graph convolutional networks for skeleton-based action recognition. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 3590\u20133598 (2019)","DOI":"10.1109\/CVPR.2019.00371"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, P., Lan, C., Zeng, W. Xing, J., Xue, J., Zheng, N.: Semantics-guided neural networks for efficient skeleton-based human action recognition. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 1112\u20131121 (2020)","DOI":"10.1109\/CVPR42600.2020.00119"},{"key":"11_CR22","doi-asserted-by":"publisher","first-page":"5103","DOI":"10.1109\/JIOT.2020.2975654","volume":"7","author":"J Li","year":"2020","unstructured":"Li, J., Liu, Y., Chen, T., Xiao, Z., Li, Z., Wang, J.: Adversarial attacks and defenses on cyber-physical systems: a survey. IEEE Internet Things J. 7, 5103\u20135115 (2020)","journal-title":"IEEE Internet Things J."},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Nowroozi, E., Dehghantanha, A., Parizi, R.M., Choo, K.-K.R.: A survey of machine learning techniques in adversarial image forensics. Comput. Secur. 100 (2021)","DOI":"10.1016\/j.cose.2020.102092"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Chen, Z., Xie, L., Pang, S., He, Y., Tian, Q.: Appending adversarial frames for universal video attack. In: Proceedings of the IEEE Conference on Application of Computer Vision, pp. 3199\u20133208 (2021)","DOI":"10.1109\/WACV48630.2021.00324"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Hwang, J., Kim, J.-H., Choi, J.-H. Lee, J.-S.: Just one moment: structural vulnerability of deep action recognition against one frame attack. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 7668\u20137676 (2021)","DOI":"10.1109\/ICCV48922.2021.00757"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Kumar, D., Kumar, C., Seah, C.W., Xia, S., Shao, M.: Finding achilles\u2019 heel: adversarial attack on multi-modal action recognition. In: ACM International Conference on Multimedia, pp. 3829\u20133837 (2020)","DOI":"10.1145\/3394171.3413531"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Diao, Y., Shao, T., Yang, Y.-L., Zhou, K., Wang, H.: BASAR: black-box attack on skeletal action recognition. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 7597\u20137607 (2021)","DOI":"10.1109\/CVPR46437.2021.00751"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: IEEE Symposium on Security and Privacy, pp. 39\u201357 (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"11_CR29","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: Proceedings of the International Conference on Learning Representations (2014)"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Hazan, T., Papandreou, G., Tarlow, D.: Adversarial perturbations of deep neural networks. In Perturbations, Optimization, and Statistics, pp. 311\u2013342 (2017)","DOI":"10.7551\/mitpress\/10761.001.0001"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Mirzaei, M.S., Meshgi, K., Frigo, E., Nishida, T.: Animgan: a spatiotemporally-conditioned generative adversarial network for character animation. In: Proceedings of the IEEE International Conference on Intelligent Control and Information Processing, pp. 2286\u20132290 (2020)","DOI":"10.1109\/ICIP40778.2020.9190871"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Yan, X., et al.: MT-VAE: learning motion transformations to generate multimodal human dynamics. In: European Conference on Computer Vision, pp. 265\u2013281 (2018)","DOI":"10.1007\/978-3-030-01228-1_17"},{"key":"11_CR33","first-page":"307","volume":"2","author":"LS Shapley","year":"2016","unstructured":"Shapley, L.S.: 17. A value for n-person games. Contribut. Theory Games 2, 307\u2013318 (2016)","journal-title":"Contribut. Theory Games"},{"key":"11_CR34","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/s001820050125","volume":"28","author":"M Grabisch","year":"1999","unstructured":"Grabisch, M., Roubens, M.: An axiomatic approach to the concept of interaction among players in cooperative games. Int. J. Game Theory 28, 547\u2013565 (1999)","journal-title":"Int. J. Game Theory"},{"key":"11_CR35","unstructured":"Kay, W., et al.: The Kinetics Human Action Video Dataset. ArXiv:1705.06950 Cs (2017)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21280-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:33:24Z","timestamp":1668760404000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21280-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031212796","9783031212802"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21280-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"19 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taipei","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ispec2022.ndhu.edu.tw\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2 invited papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}