{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:46:11Z","timestamp":1748583971394,"version":"3.40.3"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031514784"},{"type":"electronic","value":"9783031514791"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-51479-1_3","type":"book-chapter","created":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T07:02:33Z","timestamp":1704956553000},"page":"43-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Accessorize in\u00a0the\u00a0Dark: A Security Analysis of\u00a0Near-Infrared Face Recognition"],"prefix":"10.1007","author":[{"given":"Amit","family":"Cohen","sequence":"first","affiliation":[]},{"given":"Mahmood","family":"Sharif","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,12]]},"reference":[{"key":"3_CR1","unstructured":"Face ID security. https:\/\/help.apple.com\/pdf\/security\/en_US\/apple-platform-security-guide.pdf"},{"key":"3_CR2","unstructured":"Windows Hello. https:\/\/docs.microsoft.com\/en-us\/windows\/security\/identity-protection\/hello-for-business\/hello-overview"},{"key":"3_CR3","unstructured":"Athalye, A., Engstrom, L., Ilyas, A., Kwok, K.: Synthesizing robust adversarial examples. In: Proceedings ICML (2018)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Biggio, B., et al.: Evasion attacks against machine learning at test time. In: Proceedings ECML PKDD (2013)","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","volume":"84","author":"B Biggio","year":"2018","unstructured":"Biggio, B., Roli, F.: Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recogn. 84, 317\u2013331 (2018)","journal-title":"Pattern Recogn."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: Proceedings IEEE S &P (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Carlos-Roca, L.R., Torres, I.H., Tena, C.F.: Facial recognition application for border control. In: Proceedings IJCNN (2018)","DOI":"10.1109\/IJCNN.2018.8489113"},{"key":"3_CR8","unstructured":"Cohen, J., Rosenfeld, E., Kolter, Z.: Certified adversarial robustness via randomized smoothing. In: Proceedings ICML (2019)"},{"issue":"6","key":"3_CR9","doi-asserted-by":"publisher","first-page":"3102","DOI":"10.1109\/TIP.2019.2894272","volume":"28","author":"Z Deng","year":"2019","unstructured":"Deng, Z., Peng, X., Li, Z., Qiao, Y.: Mutual component convolutional neural networks for heterogeneous face recognition. IEEE Trans. Image Process. 28(6), 3102\u20133114 (2019)","journal-title":"IEEE Trans. Image Process."},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Duan, B., Fu, C., Li, Y., Song, X., He, R.: Cross-spectral face hallucination via disentangling independent factors. In: Proceedings CVPR (2020)","DOI":"10.1109\/CVPR42600.2020.00795"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Eykholt, K., et al.: Robust physical-world attacks on deep learning visual classification. In: Proceedings CVPR (2018)","DOI":"10.1109\/CVPR.2018.00175"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"2938","DOI":"10.1109\/TPAMI.2021.3052549","volume":"44","author":"C Fu","year":"2021","unstructured":"Fu, C., Wu, X., Hu, Y., Huang, H., He, R.: DVG-face: dual variational generation for heterogeneous face recognition. IEEE Trans. Pattern Anal. Mach. Intell. (PAMI) 44, 2938\u20132952 (2021)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell. (PAMI)"},{"key":"3_CR13","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: Proceedings ICLR (2015)"},{"issue":"6","key":"3_CR14","doi-asserted-by":"publisher","first-page":"3630","DOI":"10.1109\/TCSVT.2021.3105411","volume":"32","author":"W Hu","year":"2021","unstructured":"Hu, W., Hu, H.: Orthogonal modality disentanglement and representation alignment network for NIR-VIS face recognition. IEEE Trans. Circuits Syst. Video Technol. 32(6), 3630\u20133643 (2021)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"4","key":"3_CR15","doi-asserted-by":"publisher","first-page":"2411","DOI":"10.1109\/TCSVT.2021.3081514","volume":"32","author":"W Hu","year":"2021","unstructured":"Hu, W., Yan, W., Hu, H.: Dual face alignment learning network for NIR-VIS face recognition. IEEE Trans. Circuits Syst. Video Technol. 32(4), 2411\u20132424 (2021)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Huang, H., Mu, J., Gong, N.Z., Li, Q., Liu, B., Xu, M.: Data poisoning attacks to deep learning based recommender systems. In: Proceedings NDSS (2021)","DOI":"10.14722\/ndss.2021.24525"},{"issue":"1","key":"3_CR17","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.cviu.2004.04.001","volume":"97","author":"SG Kong","year":"2005","unstructured":"Kong, S.G., Heo, J., Abidi, B.R., Paik, J., Abidi, M.A.: Recent advances in visual and infrared face recognition-a review. Comput. Vis. Image Underst. 97(1), 103\u2013135 (2005)","journal-title":"Comput. Vis. Image Underst."},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Lezama, J., Qiu, Q., Sapiro, G.: Not afraid of the dark: NIR-VIS face recognition via cross-spectral hallucination and low-rank embedding. In: Proceedings CVPR (2017)","DOI":"10.1109\/CVPR.2017.720"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Li, S., Yi, D., Lei, Z., Liao, S.: The CASIA NIR-VIS 2.0 face database. In: Proceedings CVPRW (2013)","DOI":"10.1109\/CVPRW.2013.59"},{"key":"3_CR20","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: Proceedings ICLR (2018)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Mahendran, A., Vedaldi, A.: Understanding deep image representations by inverting them. In: Proceedings CVPR (2015)","DOI":"10.1109\/CVPR.2015.7299155"},{"key":"3_CR22","unstructured":"Metzen, J.H., Genewein, T., Fischer, V., Bischoff, B.: On detecting adversarial perturbations. In: Proceedings ICLR (2017)"},{"key":"3_CR23","unstructured":"Miao, Y., Lattas, A., Deng, J., Han, J., Zafeiriou, S.: Physically-based face rendering for NIR-VIS face recognition. In: Proceedings NeurIPS (2022)"},{"issue":"2","key":"3_CR24","doi-asserted-by":"publisher","first-page":"456","DOI":"10.3390\/s18020456","volume":"18","author":"RA Naqvi","year":"2018","unstructured":"Naqvi, R.A., Arsalan, M., Batchuluun, G., Yoon, H.S., Park, K.R.: Deep learning-based gaze detection system for automobile drivers using a NIR camera sensor. Sensors 18(2), 456 (2018)","journal-title":"Sensors"},{"key":"3_CR25","unstructured":"Osborne, B.G.: Near-infrared spectroscopy in food analysis. Encyclopedia of analytical chemistry: Applications, theory and instrumentation (2006)"},{"key":"3_CR26","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I.: Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. arXiv preprint (2016)"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z.B., Swami, A.: Practical black-box attacks against machine learning. In: Proceedings AsiaCCS (2017)","DOI":"10.1145\/3052973.3053009"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z.B., Swami, A.: The limitations of deep learning in adversarial settings. In: Proceedings IEEE EuroS &P (2016)","DOI":"10.1109\/EuroSP.2016.36"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Pierazzi, F., Pendlebury, F., Cortellazzi, J., Cavallaro, L.: Intriguing properties of adversarial ml attacks in the problem space. In: Proceedings S &P (2020)","DOI":"10.1109\/SP40000.2020.00073"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Sch\u00f6nherr, L., Kohls, K., Zeiler, S., Holz, T., Kolossa, D.: Adversarial attacks against automatic speech recognition systems via psychoacoustic hiding (2019)","DOI":"10.14722\/ndss.2019.23288"},{"key":"3_CR31","unstructured":"Shamir, A., Safran, I., Ronen, E., Dunkelman, O.: A simple explanation for the existence of adversarial examples with small hamming distance. arXiv preprint (2019)"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., Reiter, M.K.: Accessorize to a crime: real and stealthy attacks on state-of-the-art face recognition. In: Proceedings CCS (2016)","DOI":"10.1145\/2976749.2978392"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., Reiter, M.K.: A general framework for adversarial examples with objectives. ACM Trans. Priv. Secur. (TOPS) 22(3), 16:1\u201316:30 (2019)","DOI":"10.1145\/3317611"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: Proceedings IEEE S &P (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Shumailov, I., Zhao, Y., Bates, D., Papernot, N., Mullins, R., Anderson, R.: Sponge examples: energy-latency attacks on neural networks. In: Proceedings IEEE EuroS &P (2021)","DOI":"10.1109\/EuroSP51992.2021.00024"},{"key":"3_CR36","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: Proceedings ICLR (2014)"},{"key":"3_CR37","doi-asserted-by":"crossref","unstructured":"Tong, L., et al.: FaceSec: A fine-grained robustness evaluation framework for face recognition systems. In: Proceedings CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.01305"},{"key":"3_CR38","unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing machine learning models via prediction APIs. In: Proceedings USENIX Security (2016)"},{"key":"3_CR39","doi-asserted-by":"crossref","unstructured":"Wang, J., Liu, Y., Hu, Y., Shi, H., Mei, T.: FaceX-Zoo: a PyTorch toolbox for face recognition. In: Proceedings MM (2021)","DOI":"10.1145\/3474085.3478324"},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"Wang, X., He, X., Wang, J., He, K.: Admix: enhancing the transferability of adversarial attacks. In: Proceedings ICCV (2021)","DOI":"10.1109\/ICCV48922.2021.01585"},{"key":"3_CR41","unstructured":"Wang, Y., Bao, T., Ding, C., Zhu, M.: Face recognition in real-world surveillance videos with deep learning method. In: Proceedings ICIVC (2017)"},{"key":"3_CR42","unstructured":"Wu, T., Tong, L., Vorobeychik, Y.: Defending against physically realizable attacks on image classification. In: Proceedings ICLR (2020)"},{"issue":"11","key":"3_CR43","doi-asserted-by":"publisher","first-page":"2884","DOI":"10.1109\/TIFS.2018.2833032","volume":"13","author":"X Wu","year":"2018","unstructured":"Wu, X., He, R., Sun, Z., Tan, T.: A light CNN for deep face representation with noisy labels. IEEE Trans. Inf. Forensics Secur. 13(11), 2884\u20132896 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3_CR44","doi-asserted-by":"crossref","unstructured":"Wu, X., Huang, H., Patel, V.M., He, R., Sun, Z.: Disentangled variational representation for heterogeneous face recognition. In: Proceedings AAAI (2019)","DOI":"10.1609\/aaai.v33i01.33019005"},{"key":"3_CR45","unstructured":"Xiang, C., Bhagoji, A.N., Sehwag, V., Mittal, P.: PatchGuard: a provably robust defense against adversarial patches via small receptive fields and masking. In: Proceedings USENIX Security (2021)"},{"key":"3_CR46","unstructured":"Xiang, C., Mahloujifar, S., Mittal, P.: PatchCleanser: certifiably robust defense against adversarial patches for any image classifier. In: Proceedings USENIX Security (2022)"},{"key":"3_CR47","unstructured":"Xiang, C., Mittal, P.: PatchGuard++: efficient provable attack detection against adversarial patches. In: Proceedings ICLRW (2021)"},{"key":"3_CR48","doi-asserted-by":"crossref","unstructured":"Xu, W., Evans, D., Qi, Y.: Feature squeezing: detecting adversarial examples in deep neural networks. In: Proceedings NDSS (2018)","DOI":"10.14722\/ndss.2018.23198"},{"issue":"5","key":"3_CR49","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1007\/s11263-021-01432-4","volume":"129","author":"A Yu","year":"2021","unstructured":"Yu, A., Wu, H., Huang, H., Lei, Z., He, R.: LAMP-HQ: a large-scale multi-pose high-quality database and benchmark for NIR-VIS face recognition. Int. J. Comp. Vision (IJCV) 129(5), 1467\u20131483 (2021)","journal-title":"Int. J. Comp. Vision (IJCV)"},{"key":"3_CR50","doi-asserted-by":"crossref","unstructured":"Zhang, H., et al.: ResNeSt: split-attention networks. In: Proceedings CVPR (2022)","DOI":"10.1109\/CVPRW56347.2022.00309"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-51479-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T07:03:26Z","timestamp":1704956606000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-51479-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031514784","9783031514791"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-51479-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"12 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Hague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"478","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}