{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:50:39Z","timestamp":1775580639314,"version":"3.50.1"},"publisher-location":"Cham","reference-count":59,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031731945","type":"print"},{"value":"9783031731952","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73195-2_13","type":"book-chapter","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T09:37:25Z","timestamp":1732613845000},"page":"215-233","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards Physical World Backdoor Attacks Against Skeleton Action Recognition"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3490-0333","authenticated-orcid":false,"given":"Qichen","family":"Zheng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2730-9553","authenticated-orcid":false,"given":"Yi","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4681-0431","authenticated-orcid":false,"given":"Siyuan","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4365-4165","authenticated-orcid":false,"given":"Jun","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7479-7970","authenticated-orcid":false,"given":"Kwok-Yan","family":"Lam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6262-8125","authenticated-orcid":false,"given":"Alex","family":"Kot","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,27]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Chen, H., Fu, C., Zhao, J., Koushanfar, F.: Deepinspect: a black-box trojan detection and mitigation framework for deep neural networks. In: Proceedings of the 28th International Joint Conference on Artificial Intelligence, pp. 4658\u20134664 (2019)","DOI":"10.24963\/ijcai.2019\/647"},{"key":"13_CR2","first-page":"9727","volume":"35","author":"W Chen","year":"2022","unstructured":"Chen, W., Wu, B., Wang, H.: Effective backdoor defense by exploiting sensitivity of poisoned samples. Adv. Neural. Inf. Process. Syst. 35, 9727\u20139737 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Chen, X., et al.: BADNL: backdoor attacks against NLP models with semantic-preserving improvements. In: Annual Computer Security Applications Conference, pp. 554\u2013569 (2021)","DOI":"10.1145\/3485832.3485837"},{"key":"13_CR4","unstructured":"Chen, X., Liu, C., Li, B., Lu, K., Song, D.: Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526 (2017)"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Chen, Y., Zhang, Z., Yuan, C., Li, B., Deng, Y., Hu, W.: Channel-wise topology refinement graph convolution for skeleton-based action recognition. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 13359\u201313368 (2021)","DOI":"10.1109\/ICCV48922.2021.01311"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Chi, H.G., Ha, M.H., Chi, S., Lee, S.W., Huang, Q., Ramani, K.: Infogcn: representation learning for human skeleton-based action recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 20186\u201320196 (2022)","DOI":"10.1109\/CVPR52688.2022.01955"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Diao, Y., Shao, T., Yang, Y.L., Zhou, K., Wang, H.: Basar: black-box attack on skeletal action recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7597\u20137607 (2021)","DOI":"10.1109\/CVPR46437.2021.00751"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Doan, K., Lao, Y., Zhao, W., Li, P.: Lira: learnable, imperceptible and robust backdoor attacks. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 11966\u201311976 (2021)","DOI":"10.1109\/ICCV48922.2021.01175"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Du, Y., Fu, Y., Wang, L.: Skeleton based action recognition with convolutional neural network. In: 2015 3rd IAPR Asian Conference on Pattern Recognition (ACPR), pp. 579\u2013583. IEEE (2015)","DOI":"10.1109\/ACPR.2015.7486569"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Du, Y., Wang, W., Wang, L.: Hierarchical recurrent neural network for skeleton based action recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1110\u20131118 (2015)","DOI":"10.1109\/CVPR.2015.7298714"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Dumford, J., Scheirer, W.: Backdooring convolutional neural networks via targeted weight perturbations. In: 2020 IEEE International Joint Conference on Biometrics (IJCB), pp.\u00a01\u20139 (2020)","DOI":"10.1109\/IJCB48548.2020.9304875"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Gao, Y., Xu, C., Wang, D., Chen, S., Ranasinghe, D.C., Nepal, S.: Strip: a defence against trojan attacks on deep neural networks. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 113\u2013125 (2019)","DOI":"10.1145\/3359789.3359790"},{"key":"13_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2023.103739","volume":"233","author":"G Garcia-Cobo","year":"2023","unstructured":"Garcia-Cobo, G., SanMiguel, J.C.: Human skeletons and change detection for efficient violence detection in surveillance videos. Comput. Vis. Image Underst. 233, 103739 (2023)","journal-title":"Comput. Vis. Image Underst."},{"key":"13_CR14","unstructured":"Gu, T., Dolan-Gavitt, B., Garg, S.: Badnets: identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733 (2017)"},{"key":"13_CR15","unstructured":"Guo, C., Wu, R., Weinberger, K.Q.: Trojannet: embedding hidden trojan horse models in neural networks. arXiv preprint arXiv:2002.10078 (2020)"},{"key":"13_CR16","unstructured":"Hammoud, H.A.A.K., Ghanem, B.: Check your other door! creating backdoor attacks in the frequency domain. arXiv preprint arXiv:2109.05507 (2021)"},{"issue":"1","key":"13_CR17","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1049\/iet-cvi.2017.0062","volume":"12","author":"Y Hbali","year":"2018","unstructured":"Hbali, Y., Hbali, S., Ballihi, L., Sadgal, M.: Skeleton-based human activity recognition for elderly monitoring systems. IET Comput. Vision 12(1), 16\u201326 (2018)","journal-title":"IET Comput. Vision"},{"key":"13_CR18","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1007\/978-3-031-19682-9_79","volume-title":"International Conference on Human-Computer Interaction","author":"R Jafri","year":"2022","unstructured":"Jafri, R., Louzada Campos, R., Arabnia, H.R.: A skeleton-based deep learning approach for recognizing violent actions in surveillance scenarios. In: Stephanidis, C., Antona, M., Ntoa, S., Salvendy, G. (eds.) HCII 2022. CCIS, vol. 1655, pp. 624\u2013631. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-19682-9_79"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Ke, Q., Bennamoun, M., An, S., Sohel, F., Boussaid, F.: A new representation of skeleton sequences for 3D action recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3288\u20133297 (2017)","DOI":"10.1109\/CVPR.2017.486"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Lee, J., Lee, M., Lee, D., Lee, S.: Hierarchically decomposed graph convolutional networks for skeleton-based action recognition. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 10444\u201310453 (2023)","DOI":"10.1109\/ICCV51070.2023.00958"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Li, C., Zhong, Q., Xie, D., Pu, S.: Co-occurrence feature learning from skeleton data for action recognition and detection with hierarchical aggregation. arXiv preprint arXiv:1804.06055 (2018)","DOI":"10.24963\/ijcai.2018\/109"},{"issue":"5","key":"13_CR22","first-page":"2088","volume":"18","author":"S Li","year":"2020","unstructured":"Li, S., Xue, M., Zhao, B.Z.H., Zhu, H., Zhang, X.: Invisible backdoor attacks on deep neural networks via steganography and regularization. IEEE Trans. Dependable Secure Comput. 18(5), 2088\u20132105 (2020)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Li, X., et al.: Pointba: towards backdoor attacks in 3D point cloud. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 16492\u201316501 (2021)","DOI":"10.1109\/ICCV48922.2021.01618"},{"key":"13_CR24","unstructured":"Li, Y., Li, Y., Lv, Y., Jiang, Y., Xia, S.T.: Hidden backdoor attack against semantic segmentation models. arXiv preprint arXiv:2103.04038 (2021)"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Li, Y., Li, Y., Wu, B., Li, L., He, R., Lyu, S.: Invisible backdoor attack with sample-specific triggers. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 16463\u201316472 (2021)","DOI":"10.1109\/ICCV48922.2021.01615"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Liu, C., Hu, Y., Li, Y., Song, S., Liu, J.: PKU-MMD: a large scale benchmark for continuous multi-modal human action understanding. arXiv preprint arXiv:1703.07475 (2017)","DOI":"10.1145\/3132734.3132739"},{"issue":"4","key":"13_CR27","doi-asserted-by":"publisher","first-page":"1609","DOI":"10.1109\/TNNLS.2020.3043002","volume":"33","author":"J Liu","year":"2020","unstructured":"Liu, J., Akhtar, N., Mian, A.: Adversarial attack on skeleton-based human action recognition. IEEE Trans. Neural Netw. Learn. Syst. 33(4), 1609\u20131622 (2020)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"10","key":"13_CR28","doi-asserted-by":"publisher","first-page":"2684","DOI":"10.1109\/TPAMI.2019.2916873","volume":"42","author":"J Liu","year":"2019","unstructured":"Liu, J., Shahroudy, A., Perez, M., Wang, G., Duan, L.Y., Kot, A.C.: NTU RGB+D 120: a large-scale benchmark for 3D human activity understanding. IEEE Trans. Pattern Anal. Mach. Intell. 42(10), 2684\u20132701 (2019)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"12","key":"13_CR29","doi-asserted-by":"publisher","first-page":"3007","DOI":"10.1109\/TPAMI.2017.2771306","volume":"40","author":"J Liu","year":"2017","unstructured":"Liu, J., Shahroudy, A., Xu, D., Kot, A.C., Wang, G.: Skeleton-based action recognition using spatio-temporal LSTM network with trust gates. IEEE Trans. Pattern Anal. Mach. Intell. 40(12), 3007\u20133021 (2017)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"13_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-030-00470-5_13","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"K Liu","year":"2018","unstructured":"Liu, K., Dolan-Gavitt, B., Garg, S.: Fine-pruning: defending against backdooring attacks on deep neural networks. In: Bailey, M., Holz, T., Stamatogiannakis, M., Ioannidis, S. (eds.) RAID 2018. LNCS, vol. 11050, pp. 273\u2013294. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00470-5_13"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ma, X., Bailey, J., Lu, F.: Reflection backdoor: a natural backdoor attack on deep neural networks. In: European Conference on Computer Vision, pp. 182\u2013199 (2020)","DOI":"10.1007\/978-3-030-58607-2_11"},{"key":"13_CR32","doi-asserted-by":"crossref","unstructured":"Lu, Z., Wang, H., Chang, Z., Yang, G., Shum, H.P.: Hard no-box adversarial attack on skeleton-based human action recognition with skeleton-motion-informed gradient. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4597\u20134606 (2023)","DOI":"10.1109\/ICCV51070.2023.00424"},{"key":"13_CR33","doi-asserted-by":"crossref","unstructured":"Morais, R., Le, V., Tran, T., Saha, B., Mansour, M., Venkatesh, S.: Learning regularity in skeleton trajectories for anomaly detection in videos. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 11996\u201312004 (2019)","DOI":"10.1109\/CVPR.2019.01227"},{"key":"13_CR34","first-page":"3454","volume":"33","author":"TA Nguyen","year":"2020","unstructured":"Nguyen, T.A., Tran, A.: Input-aware dynamic backdoor attack. Adv. Neural. Inf. Process. Syst. 33, 3454\u20133464 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"13_CR35","unstructured":"Nguyen, T.A., Tran, A.T.: Wanet-imperceptible warping-based backdoor attack. In: International Conference on Learning Representations (2020)"},{"key":"13_CR36","unstructured":"Qiao, X., Yang, Y., Li, H.: Defending neural backdoors via generative distribution modeling. In: Advances in Neural Information Processing Systems, vol. 32 (2019)"},{"key":"13_CR37","doi-asserted-by":"crossref","unstructured":"Rakin, A.S., He, Z., Fan, D.: TBT: targeted neural network attack with bit trojan. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 13198\u201313207 (2020)","DOI":"10.1109\/CVPR42600.2020.01321"},{"key":"13_CR38","doi-asserted-by":"crossref","unstructured":"Shahroudy, A., Liu, J., Ng, T.T., Wang, G.: NTU RGB+D: a large scale dataset for 3D human activity analysis. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1010\u20131019 (2016)","DOI":"10.1109\/CVPR.2016.115"},{"key":"13_CR39","doi-asserted-by":"crossref","unstructured":"Tang, R., Du, M., Liu, N., Yang, F., Hu, X.: An embarrassingly simple approach for trojan attack in deep neural networks. In: Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 218\u2013228 (2020)","DOI":"10.1145\/3394486.3403064"},{"key":"13_CR40","unstructured":"Tram\u00e8r, F., Papernot, N., Goodfellow, I., Boneh, D., McDaniel, P.: The space of transferable adversarial examples. arXiv preprint arXiv:1704.03453 (2017)"},{"key":"13_CR41","doi-asserted-by":"crossref","unstructured":"Wang, B., et al.: Neural cleanse: identifying and mitigating backdoor attacks in neural networks. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 707\u2013723. IEEE (2019)","DOI":"10.1109\/SP.2019.00031"},{"key":"13_CR42","doi-asserted-by":"crossref","unstructured":"Wang, C., Yu, Y., Guo, L., Wen, B.: Benchmarking adversarial robustness of image shadow removal with shadow-adaptive attacks. In: ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 13126\u201313130. IEEE (2024)","DOI":"10.1109\/ICASSP48485.2024.10446953"},{"key":"13_CR43","doi-asserted-by":"crossref","unstructured":"Wang, H., et al.: Understanding the robustness of skeleton-based action recognition under adversarial attack. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14656\u201314665 (2021)","DOI":"10.1109\/CVPR46437.2021.01442"},{"key":"13_CR44","unstructured":"Wang, H., et al.: Smart: skeletal motion action recognition attack. arXiv preprint arXiv:1911.07107 (2019)"},{"key":"13_CR45","unstructured":"Wang, T., Yao, Y., Xu, F., An, S., Wang, T.: Backdoor attack through frequency domain. arXiv preprint arXiv:2111.10991 (2021)"},{"key":"13_CR46","doi-asserted-by":"crossref","unstructured":"Xiang, Z., Miller, D.J., Chen, S., Li, X., Kesidis, G.: A backdoor attack against 3D point cloud classifiers. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 7597\u20137607 (2021)","DOI":"10.1109\/ICCV48922.2021.00750"},{"key":"13_CR47","unstructured":"Xia, S., Yu, Y., Jiang, X., Ding, H.: Mitigating the curse of dimensionality for certified robustness via dual randomized smoothing. In: International Conference on Learning Representations (2024)"},{"key":"13_CR48","doi-asserted-by":"crossref","unstructured":"Yan, S., Xiong, Y., Lin, D.: Spatial temporal graph convolutional networks for skeleton-based action recognition. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a032 (2018)","DOI":"10.1609\/aaai.v32i1.12328"},{"issue":"1","key":"13_CR49","doi-asserted-by":"publisher","first-page":"84","DOI":"10.3724\/SP.J.2096-5796.2018.0006","volume":"1","author":"L Yang","year":"2019","unstructured":"Yang, L., Huang, J., Feng, T., Hong-An, W., Guo-Zhong, D.: Gesture interaction in virtual reality. Virtual Reality Intell. Hardw. 1(1), 84\u2013112 (2019)","journal-title":"Virtual Reality Intell. Hardw."},{"key":"13_CR50","doi-asserted-by":"crossref","unstructured":"Yang, S., Liu, J., Lu, S., Er, M.H., Kot, A.C.: Skeleton cloud colorization for unsupervised 3D action representation learning. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 13423\u201313433 (2021)","DOI":"10.1109\/ICCV48922.2021.01317"},{"key":"13_CR51","doi-asserted-by":"crossref","unstructured":"Yang, S., Liu, J., Lu, S., Hwa, E.M., Hu, Y., Kot, A.C.: Self-supervised 3D action representation learning with skeleton cloud colorization. IEEE Trans. Pattern Anal. Mach. Intell. (2023)","DOI":"10.1109\/TPAMI.2023.3325463"},{"key":"13_CR52","doi-asserted-by":"crossref","unstructured":"Yang, S., Liu, J., Lu, S., Hwa, E.M., Kot, A.C.: One-shot action recognition via multi-scale spatial-temporal skeleton matching. IEEE Trans. Pattern Anal. Mach. Intell. (2024)","DOI":"10.1109\/TPAMI.2024.3363831"},{"issue":"2","key":"13_CR53","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1109\/TBCAS.2021.3064841","volume":"15","author":"J Yin","year":"2021","unstructured":"Yin, J., et al.: MC-LSTM: real-time 3D human action detection system for intelligent healthcare applications. IEEE Trans. Biomed. Circuits Syst. 15(2), 259\u2013269 (2021)","journal-title":"IEEE Trans. Biomed. Circuits Syst."},{"key":"13_CR54","unstructured":"Yu, Y., et al.: Purify unlearnable examples via rate-constrained variational autoencoders. In: International Conference on Machine Learning (2024)"},{"key":"13_CR55","doi-asserted-by":"crossref","unstructured":"Yu, Y., Wang, Y., Yang, W., Lu, S., Tan, Y.P., Kot, A.C.: Backdoor attacks against deep image compression via adaptive frequency trigger. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 12250\u201312259 (2023)","DOI":"10.1109\/CVPR52729.2023.01179"},{"key":"13_CR56","doi-asserted-by":"crossref","unstructured":"Yu, Y., Yang, W., Tan, Y.P., Kot, A.C.: Towards robust rain removal against adversarial attacks: a comprehensive benchmark analysis and beyond. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 6013\u20136022 (2022)","DOI":"10.1109\/CVPR52688.2022.00592"},{"key":"13_CR57","doi-asserted-by":"crossref","unstructured":"Zhang, P., Lan, C., Xing, J., Zeng, W., Xue, J., Zheng, N.: View adaptive recurrent neural networks for high performance human action recognition from skeleton data. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 2117\u20132126 (2017)","DOI":"10.1109\/ICCV.2017.233"},{"key":"13_CR58","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-031-20065-6_11","volume-title":"European Conference on Computer Vision","author":"R Zheng","year":"2022","unstructured":"Zheng, R., Tang, R., Li, J., Liu, L.: Data-free backdoor removal based on channel lipschitzness. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) ECCV 2022. LNCS, vol. 13665, pp. 175\u2013191. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-20065-6_11"},{"key":"13_CR59","unstructured":"Zhou, Y., Cheng, Z.Q., Li, C., Geng, Y., Xie, X., Keuper, M.: Hypergraph transformer for skeleton-based action recognition. arXiv preprint arXiv:2211.09590 (2022)"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73195-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T10:09:36Z","timestamp":1732615776000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73195-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,27]]},"ISBN":["9783031731945","9783031731952"],"references-count":59,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73195-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,27]]},"assertion":[{"value":"27 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}