{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:44:02Z","timestamp":1772905442028,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819947546","type":"print"},{"value":"9789819947553","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-4755-3_43","type":"book-chapter","created":{"date-parts":[[2023,7,30]],"date-time":"2023-07-30T00:02:38Z","timestamp":1690675358000},"page":"499-510","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Collaborative Face Privacy Protection Method Based on Adversarial Examples in Social Networks"],"prefix":"10.1007","author":[{"given":"Zhenxiong","family":"Pan","sequence":"first","affiliation":[]},{"given":"Junmei","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xiumei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Huang","family":"Bai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,30]]},"reference":[{"key":"43_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1007\/978-3-319-16181-5_52","volume-title":"Computer Vision - ECCV 2014 Workshops","author":"A Othman","year":"2015","unstructured":"Othman, A., Ross, A.: Privacy of facial soft biometrics: suppressing gender but retaining identity. In: Agapito, L., Bronstein, M.M., Rother, C. (eds.) ECCV 2014. LNCS, vol. 8926, pp. 682\u2013696. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-16181-5_52"},{"key":"43_CR2","doi-asserted-by":"publisher","unstructured":"Hyv\u00e4rinen, A., Oja, E.: Independent component analysis: algorithms and applications. Neural Netw. 13(4\u20135), 411\u2013430 2000. https:\/\/doi.org\/10.1016\/s0893-6080(00)00026-5","DOI":"10.1016\/s0893-6080(00)00026-5"},{"key":"43_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/11767831_15","volume-title":"Privacy Enhancing Technologies","author":"R Gross","year":"2006","unstructured":"Gross, R., Airoldi, E., Malin, B., Sweeney, L.: Integrating utility into face de-identification. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 227\u2013242. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11767831_15"},{"key":"43_CR4","doi-asserted-by":"publisher","unstructured":"Vakhshiteh, F., Nickabadi, A., Ramachandra, R.: Adversarial attacks against face recognition: a comprehensive study. IEEE Access 9, 92735\u201392756 (2021). https:\/\/doi.org\/10.1109\/access.2021.3092646","DOI":"10.1109\/access.2021.3092646"},{"key":"43_CR5","doi-asserted-by":"publisher","unstructured":"Wilber M J., Shmatikov, V, Belongie, S.: Can we still avoid automatic face detection. In: 2016 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 1\u20139. IEEE. New York (2016). https:\/\/doi.org\/10.1109\/wacv.2016.7477452","DOI":"10.1109\/wacv.2016.7477452"},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M.: Generative adversarial networks. Commun. ACM 63(11), 139\u2013144 (2020)","DOI":"10.1145\/3422622"},{"key":"43_CR7","doi-asserted-by":"publisher","unstructured":"He, Y., Zhang, C., Zhu, X.: Generative adversarial network-based image privacy protection algorithm. In: Tenth International Conference on Graphics and Image Processing (ICGIP 2018), pp. 635\u2013645. SPIE, Chengdu (2019). https:\/\/doi.org\/10.1117\/12.2524274","DOI":"10.1117\/12.2524274"},{"key":"43_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-319-24574-4_28","volume-title":"Medical Image Computing and Computer-Assisted Intervention \u2014 MICCAI 2015","author":"O Ronneberger","year":"2015","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-Net: convolutional networks for biomedical image segmentation. In: Navab, N., Hornegger, J., Wells, W.M., Frangi, A.F. (eds.) MICCAI 2015. LNCS, vol. 9351, pp. 234\u2013241. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24574-4_28"},{"issue":"1","key":"43_CR9","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s11390-019-1898-8","volume":"34","author":"Y Wu","year":"2019","unstructured":"Wu, Y., Yang, F., Xu, Y., Ling, H.: Privacy-protective-gan for privacy preserving face de-identification. J. Comput. Sci. Technol. 34(1), 47\u201360 (2019). https:\/\/doi.org\/10.1007\/s11390-019-1898-8","journal-title":"J. Comput. Sci. Technol."},{"key":"43_CR10","unstructured":"Shan, S., Wenger, E., Zhang, J.: Fawkes: protecting privacy against unauthorized deep learning models. In: Proceedings of the 29th USENIX Security Symposium, p. 16. USENIX Association, Berkeley (2020)"},{"key":"43_CR11","doi-asserted-by":"publisher","unstructured":"Zhang, J., Sang, J., Zhao, X.: Adversarial privacy-preserving filter. In: Proceedings of the 28th ACM International Conference on Multimedia, pp. 1423\u20131431. Association for Computing Machinery, Seattle (2020). https:\/\/doi.org\/10.1145\/3394171.3413906","DOI":"10.1145\/3394171.3413906"},{"key":"43_CR12","unstructured":"Prangnell, L.: Visible Light-Based Human Visual System Conceptual Model. arXiv preprint arXiv:1609.04830 (2016)"},{"key":"43_CR13","doi-asserted-by":"crossref","unstructured":"Das, N., Shanbhogue, M., Chen, S.T.: Shield: Fast, practical defense and vaccination for deep learning using jpeg compression. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 196\u2013204. Association for Computing Machinery, New York (2018)","DOI":"10.1145\/3219819.3219910"},{"key":"43_CR14","doi-asserted-by":"publisher","unstructured":"Das, N., Shanbhogue, M., Chen, S.T.: Keeping the bad guys out: Protecting and vaccinating deep learning with jpeg compression. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 196\u2013204. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3219819.3219910","DOI":"10.1145\/3219819.3219910"},{"key":"43_CR15","unstructured":"Shin, R., Song, D.: Jpeg-resistant adversarial images. In: NIPS 2017 Workshop on Machine Learning and Computer Security, pp. 1\u20138. Long Beach (2017)"},{"key":"43_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, J., Yi, Q., Sang, J.: JPEG compression-resistant low-mid adversarial perturbation against unauthorized face recognition system. arXiv preprint arXiv:2206.09410 (2022)","DOI":"10.1016\/j.ins.2023.119566"},{"key":"43_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-319-97909-0_4","volume-title":"Biometric Recognition","author":"S Li","year":"2018","unstructured":"Li, S., Zhang, H., Jia, G., Yang, J.: Finger vein recognition based on weighted graph structural feature encoding. In: Zhou, J., et al. (eds.) CCBR 2018. LNCS, vol. 10996, pp. 29\u201337. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-97909-0_4"},{"key":"43_CR18","doi-asserted-by":"publisher","unstructured":"Xie, C., Zhang, Z., Zhou, Y.: Improving transferability of adversarial examples with input diversity. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2730\u20132739. IEEE, Long Beach (2019). https:\/\/doi.org\/10.1109\/cvpr.2019.00284","DOI":"10.1109\/cvpr.2019.00284"},{"key":"43_CR19","doi-asserted-by":"publisher","unstructured":"Deng, J., Guo, J., Xue, N.: Arcface: Additive angular margin loss for deep face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4690\u20134699. IEEE, Long Beach (2019). https:\/\/doi.org\/10.1109\/cvpr.2019.00482","DOI":"10.1109\/cvpr.2019.00482"},{"key":"43_CR20","doi-asserted-by":"publisher","unstructured":"Hou, Q., Zhou, D., Feng, J.: Coordinate attention for efficient mobile network design. In: 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 13713\u201313722. IEEE, Nashville (2021). https:\/\/doi.org\/10.1109\/cvpr46437.2021.01350","DOI":"10.1109\/cvpr46437.2021.01350"},{"key":"43_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-46487-9_6","volume-title":"Computer Vision \u2013 ECCV 2016","author":"Y Guo","year":"2016","unstructured":"Guo, Y., Zhang, L., Hu, Y., He, X., Gao, J.: MS-Celeb-1M: a dataset and benchmark for large-scale face recognition. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9907, pp. 87\u2013102. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46487-9_6"},{"key":"43_CR22","unstructured":"Huang, G.B., Mattar, M., Berg, T.T.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. In: Workshop on faces in \u2018Real-Life\u2019 Images: detection, alignment, and recognition. Marseille (2008)"},{"key":"43_CR23","doi-asserted-by":"publisher","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 815\u2013823. IEEE, Boston (2015). https:\/\/doi.org\/10.1109\/cvpr.2015.7298682","DOI":"10.1109\/cvpr.2015.7298682"},{"key":"43_CR24","doi-asserted-by":"publisher","unstructured":"Parkhi, O.M., Vedaldi, A., Zisserman, A.: Deep face recognition. In: Proceedings of the British Machine Vision Conference (BMVC), pp. 41.1\u201341.12. BMVA Press, Swansea (2015). https:\/\/doi.org\/10.5244\/C.29.41","DOI":"10.5244\/C.29.41"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-4755-3_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T03:01:09Z","timestamp":1702868469000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-4755-3_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819947546","9789819947553"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-4755-3_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"30 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhengzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2023a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2023\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}