{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:58:40Z","timestamp":1742954320263,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819628810"},{"type":"electronic","value":"9789819628827"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-2882-7_8","type":"book-chapter","created":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T06:59:50Z","timestamp":1741417190000},"page":"72-81","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adversarial Attacks on\u00a0Facial Images Based on\u00a0Attribute-Conditioned High-Camouflage Editing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-0848-2088","authenticated-orcid":false,"given":"Jingjing","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5938-5409","authenticated-orcid":false,"given":"Huabin","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7893-2649","authenticated-orcid":false,"given":"Dongxu","family":"Shang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1466-9230","authenticated-orcid":false,"given":"Hongrui","family":"Yuan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8553-8421","authenticated-orcid":false,"given":"Liang","family":"Tao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,9]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1007\/s11042-020-09604-z","volume":"80","author":"L Yang","year":"2021","unstructured":"Yang, L., Song, Q., Wu, Y.: Attacks on state-of-the-art face recognition using attentional adversarial attack generative network. Multimed. Tools Appl. 80, 855\u2013875 (2021)","journal-title":"Multimed. Tools Appl."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Yin, B., et al.: Adv-makeup: a new imperceptible and transferable attack on face recognition. arXiv preprint arXiv:2105.03162 (2021)","DOI":"10.24963\/ijcai.2021\/173"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Nguyen, D.L., Arora, S.S., Wu, Y., Yang, H.: Adversarial light projection attacks on face recognition systems: a feasibility study. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp. 814\u2013815 (2020)","DOI":"10.1109\/CVPRW50498.2020.00415"},{"key":"8_CR4","first-page":"34136","volume":"35","author":"S Jia","year":"2022","unstructured":"Jia, S., et al.: Adv-attribute: inconspicuous and transferable adversarial attack on face recognition. Adv. Neural. Inf. Process. Syst. 35, 34136\u201334147 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4401\u20134410 (2019)","DOI":"10.1109\/CVPR.2019.00453"},{"key":"8_CR6","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"8_CR7","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S.: Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236 (2016)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Komkov, S., Petiushko, A.: AdvHat: real-world adversarial attack on arcface face id system. In: 2020 25th International Conference on Pattern Recognition (ICPR), pp. 819\u2013826. IEEE (2021)","DOI":"10.1109\/ICPR48806.2021.9412236"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-030-58568-6_2","volume-title":"Computer Vision \u2013 ECCV 2020","author":"H Qiu","year":"2020","unstructured":"Qiu, H., Xiao, C., Yang, L., Yan, X., Lee, H., Li, B.: SemanticAdv: generating adversarial examples via attribute-conditioned image editing. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12359, pp. 19\u201337. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58568-6_2"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-030-58604-1_19","volume-title":"Computer Vision \u2013 ECCV 2020","author":"L Gao","year":"2020","unstructured":"Gao, L., Zhang, Q., Song, J., Liu, X., Shen, H.T.: Patch-wise attack for fooling deep neural network. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12373, pp. 307\u2013322. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58604-1_19"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Hu, S., et al.: Protecting facial privacy: generating adversarial identity masks via style-robust makeup transfer. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 15014\u201315023 (2022)","DOI":"10.1109\/CVPR52688.2022.01459"},{"issue":"1","key":"8_CR12","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/s44196-023-00376-6","volume":"16","author":"YM Khedr","year":"2023","unstructured":"Khedr, Y.M., Xiong, Y., He, K.: Semantic adversarial attacks on face recognition through significant attributes. Int. J. Comput. Intell. Syst. 16(1), 196 (2023)","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Wang, H., Wang, S., Chen, C., Tistarelli, M., Jin, Z.: A multi-task adversarial attack against face authentication. arXiv preprint arXiv:2408.08205 (2024)","DOI":"10.1145\/3665496"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 39\u201357. IEEE (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Choi, Y., Choi, M., Kim, M., Ha, J.W., Kim, S., Choo, J.: StarGAN: unified generative adversarial networks for multi-domain image-to-image translation. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 8789\u20138797 (2018)","DOI":"10.1109\/CVPR.2018.00916"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Dong, Y., Pang, T., Su, H., Zhu, J.: Evading defenses to transferable adversarial examples by translation-invariant attacks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4312\u20134321 (2019)","DOI":"10.1109\/CVPR.2019.00444"},{"key":"8_CR17","unstructured":"Liu, X., Shen, F., Zhao, J., Nie, C.: RSTAM: an effective black-box impersonation attack on face recognition using a mobile and compact printer. arXiv preprint arXiv:2206.12590 (2022)"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Liang, Y., Wang, H., Cao, S., Wang, J., Tao, L., Zhang, J.: Efficient and high-quality black-box face reconstruction attack. In: Proceedings of the 15th International Conference on Digital Image Processing, pp.\u00a01\u20137 (2023)","DOI":"10.1145\/3604078.3604157"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Sun, Y., Yu, L., Xie, H., Li, J., Zhang, Y.: DiffAM: diffusion-based adversarial makeup transfer for facial privacy protection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 24584\u201324594 (2024)","DOI":"10.1109\/CVPR52733.2024.02321"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Liu, D., Wang, X., Peng, C., Wang, N., Hu, R., Gao, X.: Adv-diffusion: imperceptible adversarial face identity attack via latent diffusion model. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a038, pp. 3585\u20133593 (2024)","DOI":"10.1609\/aaai.v38i4.28147"}],"container-title":["Lecture Notes in Computer Science","Advances in Brain Inspired Cognitive Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-2882-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T06:59:58Z","timestamp":1741417198000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-2882-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819628810","9789819628827"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-2882-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"9 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Brain Inspired Cognitive Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hefei","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/bics2024.dobell.me\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}