{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:52:23Z","timestamp":1743079943698,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819772315"},{"type":"electronic","value":"9789819772322"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-7232-2_27","type":"book-chapter","created":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T16:02:47Z","timestamp":1724774567000},"page":"407-421","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LPLA\u00a0:\u00a0 The Adversarial Attack Against License Plate Recognition Systems"],"prefix":"10.1007","author":[{"given":"Kejia","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yingxin","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Haiwei","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,28]]},"reference":[{"key":"27_CR1","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. Adv. Neural Inf. Proc. Syst. 25 (2012)"},{"key":"27_CR2","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks (2013). arXiv preprint arXiv:1312.6199"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Long, J., Shelhamer, E., Darrell, T.: Fully convolutional networks for semantic segmentation. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 3431\u20133440 (2015)","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Li, Y., et al.: Bevdepth: acquisition of reliable depth for multi-view 3d object detection. In: Proceedings of the AAAI Conference on Artificial Intelligence 37(2), pp. 1477\u20131485 (2023)","DOI":"10.1609\/aaai.v37i2.25233"},{"issue":"1","key":"27_CR5","doi-asserted-by":"publisher","first-page":"930","DOI":"10.1007\/s10489-022-03473-9","volume":"53","author":"S Kim","year":"2023","unstructured":"Kim, S., Lee, J., Ko, B.C.: SSL-MOT: self-supervised learning based multi-object tracking. Appl. Intell. 53(1), 930\u2013940 (2023)","journal-title":"Appl. Intell."},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Wang, Q., Guo, G.: Cqa-face: contrastive quality-aware attentions for face recognition. In: Proceedings of the AAAI Conference on Artificial Intelligence 36(3), pp. 2504\u20132512 (2022)","DOI":"10.1609\/aaai.v36i3.20151"},{"key":"27_CR7","doi-asserted-by":"publisher","first-page":"103844","DOI":"10.1016\/j.jvcir.2023.103844","volume":"94","author":"S Pan","year":"2023","unstructured":"Pan, S., Chen, S.-B., Luo, B.: A super-resolution-based license plate recognition method for remote surveillance. J. Vis. Commun. Image Represent. 94, 103844 (2023)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"2","key":"27_CR8","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TITS.2017.2784093","volume":"19","author":"L Xie","year":"2018","unstructured":"Xie, L., Ahmad, T., Jin, L., Liu, Y., Zhang, S.: A new CNN-based method for multi-directional car license plate detection. IEEE Trans. Intell. Transp. Syst. 19(2), 507\u2013517 (2018)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Hsu, G.S., Ambikapathi, A., Chung, S.L., Su, C.P.: Robust license plate detection in the wild. In: 2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/AVSS.2017.8078493"},{"issue":"14","key":"27_CR10","doi-asserted-by":"publisher","first-page":"5283","DOI":"10.3390\/s22145283","volume":"22","author":"P Batra","year":"2022","unstructured":"Batra, P., et al.: A novel memory and time-efficient ALPR system based on YOLOv5. Sensors 22(14), 5283 (2022)","journal-title":"Sensors"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Shi, H., Zhao, D.: License plate recognition system based on improved YOLOv5 and GRU. IEEE Access 11, 10429\u201310439 (2023)","DOI":"10.1109\/ACCESS.2023.3240439"},{"issue":"2","key":"27_CR12","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.32604\/cmc.2020.011834","volume":"65","author":"Z Gu","year":"2020","unstructured":"Gu, Z., et al.: Adversarial attacks on license plate recognition systems. Comput. Mater. Continua 65(2), 1437\u20131452 (2020)","journal-title":"Comput. Mater. Continua"},{"key":"27_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-030-42921-8_6","volume-title":"Information Security and Cryptology","author":"M Zha","year":"2020","unstructured":"Zha, M., Meng, G., Lin, C., Zhou, Z., Chen, K.: RoLMA: a practical adversarial attack against deep learning-based LPR systems. In: Liu, Z., Yung, M. (eds.) Inscrypt 2019. LNCS, vol. 12020, pp. 101\u2013117. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-42921-8_6"},{"key":"27_CR14","doi-asserted-by":"publisher","first-page":"101826","DOI":"10.1016\/j.cose.2020.101826","volume":"95","author":"Y Qian","year":"2020","unstructured":"Qian, Y., et al.: Spot evasion attacks: adversarial examples for license plate recognition systems with convolutional neural networks. Comput. Secur. 95, 101826 (2020)","journal-title":"Comput. Secur."},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Yang, K., Tsai, T., Yu, H., Ho, T.Y., Jin, Y.: Beyond digital domain: fooling deep learning based recognition system in physical world. In: Proceedings of the AAAI Conference on Artificial Intelligence 34(01), pp. 1088\u20131095 (2020)","DOI":"10.1609\/aaai.v34i01.5459"},{"key":"27_CR16","unstructured":"Ren, S., He, K., Girshick, R., Sun, J.: Faster R-CNN: towards real-time object detection with region proposal networks. Adv. Neural Inf. Proc. Syst. 28 (2015)"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You only look once: Unified, real-time object detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 779\u2013788 (2016)","DOI":"10.1109\/CVPR.2016.91"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Redmon, J., Farhadi, A.: YOLO9000: better, faster, stronger. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 7263\u20137271 (2017)","DOI":"10.1109\/CVPR.2017.690"},{"issue":"23","key":"27_CR19","doi-asserted-by":"publisher","first-page":"9477","DOI":"10.3390\/s22239477","volume":"22","author":"R Al-Batat","year":"2022","unstructured":"Al-Batat, R., Angelopoulou, A., Premkumar, S., Hemanth, J., Kapetanios, E.: An end-to-end automated license plate recognition system using YOLO based vehicle and license plate detection with vehicle classification. Sensors 22(23), 9477 (2022)","journal-title":"Sensors"},{"key":"27_CR20","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1007\/978-3-030-90633-7_51","volume-title":"Advanced Intelligent Systems for Sustainable Development (AI2SD\u20192020)","author":"A Fadili","year":"2022","unstructured":"Fadili, A., El Aroussi, M., Fakhri, Y.: Real-time Moroccan license plate recognition based on\u00a0improved tiny-YOLOv3. In: AI2SD 2020. AISC, vol. 1417, pp. 600\u2013612. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-90633-7_51"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Wang, J.: Adversarial examples in physical world. In: IJCAI, pp. 4925\u20134926 (2021)","DOI":"10.24963\/ijcai.2021\/694"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Thys, S., Van\u00a0Ranst, W., Goedem\u00e9, T.: Fooling automated surveillance cameras: adversarial patches to attack person detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops, pp. 0\u20130 (2019)","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"Hu, Y.C.T., Kung, B.H., Tan, D.S., Chen, J.C., Hua, K.L., Cheng, W.H.: Naturalistic physical adversarial patch for object detectors. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 7848\u20137857 (2021)","DOI":"10.1109\/ICCV48922.2021.00775"},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Hu, Z., Huang, S., Zhu, X., Sun, F., Zhang, B., Hu, X.: Adversarial texture for fooling person detectors in the physical world. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 13307\u201313316 (2022)","DOI":"10.1109\/CVPR52688.2022.01295"},{"key":"27_CR25","doi-asserted-by":"crossref","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., Reiter, M.K.: Accessorize to a crime: real and stealthy attacks on state-of-the-art face recognition. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1528\u20131540 (2016)","DOI":"10.1145\/2976749.2978392"},{"key":"27_CR26","doi-asserted-by":"crossref","unstructured":"Xu, Z., et al.: Towards end-to-end license plate detection and recognition: a large dataset and baseline. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 255\u2013271 (2018)","DOI":"10.1007\/978-3-030-01261-8_16"},{"key":"27_CR27","doi-asserted-by":"publisher","first-page":"103541","DOI":"10.1016\/j.jvcir.2022.103541","volume":"86","author":"Y Gong","year":"2022","unstructured":"Gong, Y., et al.: Unified Chinese license plate detection and recognition with high efficiency. J. Vis. Commun. Image Represent. 86, 103541 (2022)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"27_CR28","doi-asserted-by":"publisher","first-page":"106554","DOI":"10.1016\/j.dib.2020.106554","volume":"33","author":"GVT Silvano","year":"2020","unstructured":"Silvano, G.V.T., et al.: Artificial Mercosur license plates dataset. Data Brief 33, 106554 (2020)","journal-title":"Data Brief"},{"key":"27_CR29","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples (2014). arXiv preprint arXiv:1412.6572"},{"key":"27_CR30","unstructured":"Brown, T.B., Man\u00e9, D., Roy, A., Abadi, M., Gilmer, J.: Adversarial patch (2017). arXiv preprint arXiv:1712.09665"},{"key":"27_CR31","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial examples in the physical world. In: Artificial intelligence safety and security. Chapman and Hall\/CRC, pp. 99\u2013112 (2018)","DOI":"10.1201\/9781351251389-8"},{"key":"27_CR32","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks (2017). arXiv preprint arXiv:1706.06083"},{"key":"27_CR33","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: IEEE Symposium on Security and Privacy (SP), pp. 39\u201357 (2017). IEEE (2017)","DOI":"10.1109\/SP.2017.49"}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-7232-2_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T16:10:11Z","timestamp":1724775011000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-7232-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819772315","9789819772322"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-7232-2_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"28 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APWeb-WAIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jinhua","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apwebwaim2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/apweb2024.zjnu.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}