{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T18:08:12Z","timestamp":1771956492646,"version":"3.50.1"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031773914","type":"print"},{"value":"9783031773921","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-77392-1_25","type":"book-chapter","created":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T18:27:25Z","timestamp":1737484045000},"page":"330-341","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Black Box Adversarial Face Transformation Network"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Sunderhaft","sequence":"first","affiliation":[]},{"given":"Ram","family":"Bhagat","sequence":"additional","affiliation":[]},{"given":"John","family":"Birchwood","sequence":"additional","affiliation":[]},{"given":"Elio","family":"Heller","sequence":"additional","affiliation":[]},{"given":"\u0130lke","family":"Demir","sequence":"additional","affiliation":[]},{"given":"Umur Aybars","family":"\u00c7ift\u00e7i","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,22]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Abdullah, N.A., Saidi, M.J., Rahman, N.H.A., Wen, C.C., Hamid, I.R.A.: Face recognition for criminal identification: an implementation of principal component analysis for face recognition. In: AIP Conference Proceedings, vol.\u00a01891. AIP Publishing (2017)","DOI":"10.1063\/1.5005335"},{"key":"25_CR2","unstructured":"Alparslan, Y., Alparslan, K., Keim-Shenk, J., Khade, S., Greenstadt, R.: Adversarial attacks on convolutional neural networks in facial recognition domain. arXiv preprint arXiv:2001.11137 (2020)"},{"key":"25_CR3","doi-asserted-by":"publisher","unstructured":"Bai, Y., Wang, Y., Zeng, Y., Jiang, Y., Xia, S.T.: Query efficient black-box adversarial attack on deep neural networks. Pattern Recogn. 133, 109037 (2023). https:\/\/doi.org\/10.1016\/j.patcog.2022.109037, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0031320322005179","DOI":"10.1016\/j.patcog.2022.109037"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Baluja, S., Fischer, I.: Learning to attack: adversarial transformation networks. In: Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence and Thirtieth Innovative Applications of Artificial Intelligence Conference and Eighth AAAI Symposium on Educational Advances in Artificial Intelligence. AAAI\u201918\/IAAI\u201918\/EAAI\u201918. AAAI Press (2018)","DOI":"10.1609\/aaai.v32i1.11672"},{"key":"25_CR5","doi-asserted-by":"publisher","unstructured":"Baqeel, H., Saeed, S.: Face detection authentication on smartphones: end users usability assessment experiences. In: 2019 International Conference on Computer and Information Sciences (ICCIS). pp.\u00a01\u20136 (2019). https:\/\/doi.org\/10.1109\/ICCISci.2019.8716452","DOI":"10.1109\/ICCISci.2019.8716452"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Byun, J., Go, H., Kim, C.: Geometrically adaptive dictionary attack on face recognition. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV), pp. 3021\u20133030 (2022)","DOI":"10.1109\/WACV51458.2022.00386"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Cao, Q., Shen, L., Xie, W., Parkhi, O.M., Zisserman, A.: Vggface2: a dataset for recognising faces across pose and age. In: 2018 13th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2018), pp. 67\u201374. IEEE (2018)","DOI":"10.1109\/FG.2018.00020"},{"issue":"3","key":"25_CR8","doi-asserted-by":"publisher","first-page":"1247","DOI":"10.5194\/gmd-7-1247-2014","volume":"7","author":"T Chai","year":"2014","unstructured":"Chai, T., Draxler, R.R.: Root mean square error (RMSE) or mean absolute error (MAE)?-Arguments against avoiding RMSE in the literature. Geosci. Model Dev. 7(3), 1247\u20131250 (2014)","journal-title":"Geosci. Model Dev."},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Chaki, N.M., Ashour, M.W.: Automated border control systems: a literature review. In: 4th Smart Cities Symposium (SCS 2021), vol.\u00a02021, pp. 152\u2013157. IET (2021)","DOI":"10.1049\/icp.2022.0331"},{"key":"25_CR10","unstructured":"Cherepanova, V., et al.: Lowkey: leveraging adversarial attacks to protect social media users from facial recognition. arXiv preprint arXiv:2101.07922 (2021)"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Choi, J., Hu, S., Young, S.S., Davis, L.S.: Thermal to visible face recognition. In: Sensing Technologies for Global Health, Military Medicine, Disaster Response, and Environmental Monitoring II; and Biometric Technology for Human Identification IX, vol.\u00a08371, pp. 252\u2013261. SPIE (2012)","DOI":"10.1117\/12.920330"},{"key":"25_CR12","unstructured":"Chollet, F., et\u00a0al.: Keras (2015). https:\/\/keras.io"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Ciftci, U.A., Yuksek, G., Demir, I.: My face my choice: privacy enhancing deepfakes for social media anonymization. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 1369\u20131379 (2023)","DOI":"10.1109\/WACV56688.2023.00142"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Niannan, X., Zafeiriou, S.: Arcface: additive angular margin loss for deep face recognition. In: CVPR (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Dong, Y., et al.: Efficient decision-based black-box adversarial attacks on face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7714\u20137722 (2019)","DOI":"10.1109\/CVPR.2019.00790"},{"issue":"4","key":"25_CR16","first-page":"209","volume":"42","author":"P Henman","year":"2020","unstructured":"Henman, P.: Improving public services using artificial intelligence: possibilities, pitfalls, governance. Asia Pac. J. Publ. Adm. 42(4), 209\u2013221 (2020)","journal-title":"Asia Pac. J. Publ. Adm."},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Hore, A., Ziou, D.: Image quality metrics: PSNR vs. SSIM. In: 2010 20th International Conference on Pattern Recognition, pp. 2366\u20132369. IEEE (2010)","DOI":"10.1109\/ICPR.2010.579"},{"key":"25_CR18","unstructured":"Huang, G.B., Ramesh, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Technical report 07-49, University of Massachusetts, Amherst (2007)"},{"key":"25_CR19","unstructured":"Jia, S., et al.: Adv-attribute: inconspicuous and transferable adversarial attack on face recognition. In: Advances in Neural Information Processing Systems, vol. 35, pp. 34136\u201334147 (2022)"},{"key":"25_CR20","unstructured":"Karras, T., Aila, T., Laine, S., Lehtinen, J.: Progressive growing of GANs for improved quality, stability, and variation. arXiv preprint arXiv:1710.10196 (2017)"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Khan, M., Chakraborty, S., Astya, R., Khepra, S.: Face detection and recognition using OpenCV. In: 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), pp. 116\u2013119. IEEE (2019)","DOI":"10.1109\/ICCCIS48478.2019.8974493"},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"Kim, Y., Park, W., Roh, M.C., Shin, J.: Groupface: learning latent groups and constructing group-based representations for face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2020)","DOI":"10.1109\/CVPR42600.2020.00566"},{"key":"25_CR23","doi-asserted-by":"publisher","unstructured":"Lahitani, A.R., Permanasari, A.E., Setiawan, N.A.: Cosine similarity to determine similarity measure: study case in online essay assessment. In: 2016 4th International Conference on Cyber and IT Service Management, pp.\u00a01\u20136 (2016). https:\/\/doi.org\/10.1109\/CITSM.2016.7577578","DOI":"10.1109\/CITSM.2016.7577578"},{"key":"25_CR24","doi-asserted-by":"publisher","first-page":"5636","DOI":"10.1109\/TIFS.2023.3310352","volume":"18","author":"H Ma","year":"2023","unstructured":"Ma, H., Xu, K., Jiang, X., Zhao, Z., Sun, T.: Transferable black-box attack against face recognition with spatial mutable adversarial patch. IEEE Trans. Inf. Forensics Secur. 18, 5636\u20135650 (2023). https:\/\/doi.org\/10.1109\/TIFS.2023.3310352","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"25_CR25","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks (2019)"},{"key":"25_CR26","doi-asserted-by":"crossref","unstructured":"Maximov, M., Elezi, I., Leal-Taixe, L.: CiaGAN: conditional identity anonymization generative adversarial networks. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2020)","DOI":"10.1109\/CVPR42600.2020.00549"},{"key":"25_CR27","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Fawzi, O., Frossard, P.: Universal adversarial perturbations. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1765\u20131773 (2017)","DOI":"10.1109\/CVPR.2017.17"},{"key":"25_CR28","doi-asserted-by":"crossref","unstructured":"Nguyen, D.L., Arora, S.S., Wu, Y., Yang, H.: Adversarial light projection attacks on face recognition systems: a feasibility study. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops (2020)","DOI":"10.1109\/CVPRW50498.2020.00415"},{"key":"25_CR29","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-030-63322-6_8","volume-title":"Software Engineering Perspectives in Intelligent Systems","author":"A Obukhov","year":"2020","unstructured":"Obukhov, A., Krasnyanskiy, M.: Quality assessment method for GAN based on modified metrics inception score and Fr\u00e9chet inception distance. In: Silhavy, R., Silhavy, P., Prokopova, Z. (eds.) CoMeSySo 2020. AISC, vol. 1294, pp. 102\u2013114. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-63322-6_8"},{"key":"25_CR30","unstructured":"OpenCV: Open source computer vision library (2015)"},{"key":"25_CR31","doi-asserted-by":"publisher","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z.B., Swami, A.: Practical black-box attacks against machine learning. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 506\u2013519 (2017). https:\/\/doi.org\/10.1145\/3052973.3053009","DOI":"10.1145\/3052973.3053009"},{"key":"25_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-319-24574-4_28","volume-title":"Medical Image Computing and Computer-Assisted Intervention \u2013 MICCAI 2015","author":"O Ronneberger","year":"2015","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-net: convolutional networks for biomedical image segmentation. In: Navab, N., Hornegger, J., Wells, W.M., Frangi, A.F. (eds.) MICCAI 2015. LNCS, vol. 9351, pp. 234\u2013241. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24574-4_28"},{"key":"25_CR33","doi-asserted-by":"publisher","unstructured":"Sai, Y., Jinxia, R., Zhongxia, L.: Learning of neural networks based on weighted mean squares error function. In: 2009 Second International Symposium on Computational Intelligence and Design, vol.\u00a01, pp. 241\u2013244 (2009). https:\/\/doi.org\/10.1109\/ISCID.2009.67","DOI":"10.1109\/ISCID.2009.67"},{"key":"25_CR34","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: Facenet: a unified embedding for face recognition and clustering. In: CVPR, pp. 815\u2013823. IEEE Computer Society (2015). http:\/\/dblp.uni-trier.de\/db\/conf\/cvpr\/cvpr2015.html","DOI":"10.1109\/CVPR.2015.7298682"},{"issue":"4","key":"25_CR35","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1109\/TIP.2011.2176951","volume":"21","author":"WR Schwartz","year":"2012","unstructured":"Schwartz, W.R., Guo, H., Choi, J., Davis, L.S.: Face identification using large feature sets. IEEE Trans. Image Process. 21(4), 2245\u20132255 (2012). https:\/\/doi.org\/10.1109\/TIP.2011.2176951","journal-title":"IEEE Trans. Image Process."},{"key":"25_CR36","doi-asserted-by":"publisher","unstructured":"Swearingen, T., Ross, A.: Lookalike disambiguation: improving face identification performance at top ranks. In: 2020 25th International Conference on Pattern Recognition (ICPR), pp. 10508\u201310515 (2021). https:\/\/doi.org\/10.1109\/ICPR48806.2021.9412063","DOI":"10.1109\/ICPR48806.2021.9412063"},{"key":"25_CR37","doi-asserted-by":"publisher","first-page":"92735","DOI":"10.1109\/ACCESS.2021.3092646","volume":"9","author":"F Vakhshiteh","year":"2021","unstructured":"Vakhshiteh, F., Nickabadi, A., Ramachandra, R.: Adversarial attacks against face recognition: a comprehensive study. IEEE Access 9, 92735\u201392756 (2021)","journal-title":"IEEE Access"},{"issue":"1","key":"25_CR38","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s43681-022-00146-8","volume":"3","author":"RA Waelen","year":"2023","unstructured":"Waelen, R.A.: The struggle for recognition in the age of facial recognition technology. AI Ethics 3(1), 215\u2013222 (2023)","journal-title":"AI Ethics"},{"key":"25_CR39","doi-asserted-by":"publisher","unstructured":"Wen, Y., Zhang, K., Li, Z., Qiao, Y.: A comprehensive study on center loss for deep face recognition. Int. J. Comput. Vision 127(6\u20137) (2019). https:\/\/doi.org\/10.1007\/s11263-018-01142-4","DOI":"10.1007\/s11263-018-01142-4"},{"issue":"3","key":"25_CR40","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TBC.2008.2000733","volume":"54","author":"S Winkler","year":"2008","unstructured":"Winkler, S., Mohandas, P.: The evolution of video quality measurement: from PSNR to hybrid metrics. IEEE Trans. Broadcast. 54(3), 660\u2013668 (2008)","journal-title":"IEEE Trans. Broadcast."},{"key":"25_CR41","unstructured":"Zhang, C., Zhang, Z.: A survey of recent advances in face detection. Technocal report MSR-TR-2010-66 (2010). https:\/\/www.microsoft.com\/en-us\/research\/publication\/a-survey-of-recent-advances-in-face-detection\/"},{"key":"25_CR42","doi-asserted-by":"publisher","unstructured":"Zhao, W., Chellappa, R., Phillips, P.J., Rosenfeld, A.: Face recognition: a literature survey. ACM Comput. Surv. 35(4), 399\u2013458 (2003). https:\/\/doi.org\/10.1145\/954339.954342","DOI":"10.1145\/954339.954342"},{"key":"25_CR43","doi-asserted-by":"publisher","first-page":"1452","DOI":"10.1109\/TIFS.2020.3036801","volume":"16","author":"Y Zhong","year":"2020","unstructured":"Zhong, Y., Deng, W.: Towards transferable adversarial attack against deep face recognition. IEEE Trans. Inf. Forensics Secur. 16, 1452\u20131466 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Advances in Visual Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-77392-1_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T18:27:39Z","timestamp":1737484059000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-77392-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031773914","9783031773921"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-77392-1_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"22 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISVC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Visual Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lake Tahoe, NV","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isvc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.isvc.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}