{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:01:09Z","timestamp":1772643669228,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819755936","type":"print"},{"value":"9789819755943","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5594-3_7","type":"book-chapter","created":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T15:06:26Z","timestamp":1723561586000},"page":"72-84","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Boosting Robustness of Silhouette-Based Gait Recognition Against Adversarial Attacks"],"prefix":"10.1007","author":[{"given":"Bingbing","family":"Ji","sequence":"first","affiliation":[]},{"given":"Xin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wenhao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Futian","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,14]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Fan, C., Liang, J., Shen, C., Hou, S., Huang, Y., Yu, S.: Opengait: Revisiting gait recognition toward better practicality. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 9707\u20139716 (2023)","DOI":"10.1109\/CVPR52729.2023.00936"},{"issue":"2\u20133","key":"7_CR2","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s11265-022-01742-x","volume":"95","author":"M Maqsood","year":"2023","unstructured":"Maqsood, M., Ghazanfar, M.A., Mehmood, I., Hwang, E., Rho, S.: A meta-heuristic optimization based less imperceptible adversarial attack on gait based surveillance systems. J. Signal Process. Syst. 95(2\u20133), 129\u2013151 (2023)","journal-title":"J. Signal Process. Syst."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Jia, X., Zhang, Y., Wu, B., Ma, K., Wang, J., Cao, X.: Las-at: Adversarial training with learnable attack strategy. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 13398\u201313408 (2022)","DOI":"10.1109\/CVPR52688.2022.01304"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Xie, C., Wu, Y., Maaten, L.v.d., Yuille, A.L., He, K.: Feature denoising for improving adversarial robustness. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 501\u2013509 (2019)","DOI":"10.1109\/CVPR.2019.00059"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Wu, X., Jha, S., Swami, A.: Distillation as a defense to adversarial perturbations against deep neural networks. In: IEEE Symposium on Security and Privacy (SP), pp. 582\u2013597 (2016)","DOI":"10.1109\/SP.2016.41"},{"key":"7_CR6","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: International Conference on Learning Representations (ICLR). San Diego (2015)"},{"key":"7_CR7","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: International Conference on Learning Representations (ICLR) (2014)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: IEEE Symposium on Security and Privacy (SP), pp. 39\u201357 (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Wang, Z., Tang, C.: Model-based gait recognition using graph network on very large population database. arXiv preprint arXiv:2112.10305 (2021)","DOI":"10.2139\/ssrn.4023122"},{"issue":"2","key":"7_CR10","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/TBIOM.2022.3216857","volume":"5","author":"S Hou","year":"2023","unstructured":"Hou, S., Fan, C., Cao, C., Liu, X., Huang, Y.: A comprehensive study on the evaluation of silhouette-based gait recognition. IEEE Trans. Biometrics, Behav. Ident. Sci. 5(2), 196\u2013208 (2023)","journal-title":"IEEE Trans. Biometrics, Behav. Ident. Sci."},{"key":"7_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.107069","volume":"98","author":"R Liao","year":"2020","unstructured":"Liao, R., Yu, S., An, W., Huang, Y.: A model-based gait recognition method with body pose and human prior knowledge. Pattern Recogn. 98, 107069 (2020)","journal-title":"Pattern Recogn."},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Li, X., Makihara, Y., Xu, C., Yagi, Y., Yu, S., Ren, M.: End-to-end model-based gait recognition. In: Proceedings of the Asian Conference on Computer Vision (2020)","DOI":"10.1007\/978-3-030-69535-4_1"},{"issue":"6","key":"7_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2816795.2818013","volume":"34","author":"M Loper","year":"2015","unstructured":"Loper, M., Mahmood, N., Romero, J., Pons-Moll, G., Black, M.J.: Smpl: a skinned multi-person linear model. ACM Trans. Graph. 34(6), 1\u201316 (2015)","journal-title":"ACM Trans. Graph."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Teepe, T., Khan, A., Gilg, J., Herzog, F., Hormann, S., Rigoll, G.: Gaitgraph: graph convolutional network for skeleton-based gait recognition. In: IEEE International Conference on Image Processing, pp. 2314\u20132318 (2021)","DOI":"10.1109\/ICIP42928.2021.9506717"},{"issue":"2","key":"7_CR15","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TPAMI.2006.38","volume":"28","author":"J Han","year":"2006","unstructured":"Han, J., Bhanu, B.: Individual recognition using gait energy image. IEEE Trans. Pattern Anal. Mach. Intell. 28(2), 316\u2013322 (2006)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Chao, H., He, Y., Zhang, J., Feng, J.: Gaitset: Regarding gait as a set for cross-view gait recognition. In: AAAI Conference on Artificial Intelligence, pp. 8126\u20138133 (2019)","DOI":"10.1609\/aaai.v33i01.33018126"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Fan, C., et al.: Gaitpart: temporal part-based model for gait recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 14225\u201314233 (2020)","DOI":"10.1109\/CVPR42600.2020.01423"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Lin, B., Zhang, S., Yu, X.: Gait recognition via effective global-local feature representation and local temporal aggregation. In: IEEE International Conference on Computer Vision, pp. 14648\u201314656 (2021)","DOI":"10.1109\/ICCV48922.2021.01438"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial examples in the physical world. In: Artificial Intelligence Safety and Security, pp. 99\u2013112. Chapman and Hall\/CRC (2018)","DOI":"10.1201\/9781351251389-8"},{"key":"7_CR20","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: International Conference on Learning Representations (2018)"},{"key":"7_CR21","unstructured":"Croce, F., Hein, M.: Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In: International Conference on Machine Learning, pp. 2206\u20132216. PMLR (2020)"},{"key":"7_CR22","unstructured":"Sehwag, V., Mahloujifar, S., Handina, T., et al.: Robust learning meets generative models: Can proxy distributions improve adversarial robustness? arXiv preprint arXiv:2104.09425 (2021)"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Huang, B., Chen, M., Wang, Y., Lu, J., Cheng, M.M., Wang, W.: Boosting accuracy and robustness of student models via adaptive adversarial distillation. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 24668\u201324677 (2023)","DOI":"10.1109\/CVPR52729.2023.02363"},{"key":"7_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109028","volume":"133","author":"Z He","year":"2023","unstructured":"He, Z., Wang, W., Dong, J., Tan, T.: Temporal sparse adversarial attack on sequence-based gait recognition. Pattern Recogn. 133, 109028 (2023)","journal-title":"Pattern Recogn."},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Maqsood, M., et al.: An autonomous decision-making framework for gait recognition systems against adversarial attack using reinforcement learning. ISA Trans. 132, 80\u201393 (2023)","DOI":"10.1016\/j.isatra.2022.11.016"},{"key":"7_CR26","unstructured":"Singh, S., Singh, R.: Comparison of various edge detection techniques. In: 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 393\u2013396. IEEE (2015)"},{"key":"7_CR27","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: International Conference on Learning Representations (2014)"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 4700\u20134708 (2016)","DOI":"10.1109\/CVPR.2016.308"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Zagoruyko, S., Komodakis, N.: Wide residual networks. In: British Machine Vision Conference, pp. 1\u201316 (2016)","DOI":"10.5244\/C.30.87"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Maaten, L.D., Weinberger, K.Q.: Densely connected convolutional networks. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 4700\u20134708 (2017)","DOI":"10.1109\/CVPR.2017.243"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5594-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T15:07:21Z","timestamp":1723561641000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5594-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819755936","9789819755943"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5594-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"14 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2024\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}