{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:00:48Z","timestamp":1773511248792,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819984688","type":"print"},{"value":"9789819984695","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T00:00:00Z","timestamp":1703462400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T00:00:00Z","timestamp":1703462400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8469-5_5","type":"book-chapter","created":{"date-parts":[[2023,12,24]],"date-time":"2023-12-24T17:02:18Z","timestamp":1703437338000},"page":"57-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Minimum Assumption Reconstruction Attacks: Rise of\u00a0Security and\u00a0Privacy Threats Against Face Recognition"],"prefix":"10.1007","author":[{"given":"Dezhi","family":"Li","sequence":"first","affiliation":[]},{"given":"Hojin","family":"Park","sequence":"additional","affiliation":[]},{"given":"Xingbo","family":"Dong","sequence":"additional","affiliation":[]},{"given":"YenLung","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Andrew Beng Jin","family":"Teoh","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,25]]},"reference":[{"issue":"5","key":"5_CR1","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1109\/TPAMI.2018.2827389","volume":"41","author":"G Mai","year":"2018","unstructured":"Mai, G., Cao, K., Yuen, P.C., Jain, A.K.: On the reconstruction of face images from deep face templates. IEEE Trans. Pattern Anal. Mach. Intell. 41(5), 1188\u20131202 (2018)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"5_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3038924","volume":"50","author":"R Ramachandra","year":"2017","unstructured":"Ramachandra, R., Busch, C.: Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput. Surv. (CSUR) 50(1), 1\u201337 (2017)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"23","key":"5_CR3","doi-asserted-by":"publisher","first-page":"8547","DOI":"10.3390\/app10238547","volume":"10","author":"F Wang","year":"2020","unstructured":"Wang, F., Leng, L., Teoh, A.B.J., Chu, J.: Palmprint false acceptance attack with a generative adversarial network (GAN). Appl. Sci. 10(23), 8547 (2020)","journal-title":"Appl. Sci."},{"issue":"2","key":"5_CR4","first-page":"1","volume":"54","author":"Z Wang","year":"2021","unstructured":"Wang, Z., She, Q., Ward, T.E.: Generative adversarial networks in computer vision: a survey and taxonomy. ACM Comput. Surv. (CSUR) 54(2), 1\u201338 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Zhai, J., Zhang, S., Chen, J., He, Q.: Autoencoder and its various variants. In: IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 415\u2013419. IEEE (2018)","DOI":"10.1109\/SMC.2018.00080"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Cole, F., Belanger, D., Krishnan, D., Sarna, A., Mosseri, I., Freeman, W.T.: Synthesizing normalized faces from facial identity features. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3703\u20133712 (2017)","DOI":"10.1109\/CVPR.2017.361"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Dong, X., Jin, Z., Guo, Z., Teoh, A.B.J.: Towards generating high definition face images from deep templates. In: International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1\u201311. IEEE (2021)","DOI":"10.1109\/BIOSIG52210.2021.9548290"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aila, T.: A style-based generator architecture for generative adversarial networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4401\u20134410 (2019)","DOI":"10.1109\/CVPR.2019.00453"},{"key":"5_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.107032","volume":"98","author":"S Jia","year":"2020","unstructured":"Jia, S., Guo, G., Xu, Z.: A survey on 3D mask presentation attack detection and countermeasures. Pattern Recogn. 98, 107032 (2020)","journal-title":"Pattern Recogn."},{"issue":"4","key":"5_CR10","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1049\/iet-bmt.2013.0020","volume":"3","author":"C Sousedik","year":"2014","unstructured":"Sousedik, C., Busch, C.: Presentation attack detection methods for fingerprint recognition systems: a survey. IET Biometrics 3(4), 219\u2013233 (2014)","journal-title":"IET Biometrics"},{"issue":"5","key":"5_CR11","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/MSP.2020.3003837","volume":"37","author":"S Liu","year":"2020","unstructured":"Liu, S., Chen, P.-Y., Kailkhura, B., Zhang, G., Hero, A.O., III., Varshney, P.K.: A primer on zeroth-order optimization in signal processing and machine learning: principals, recent advances, and applications. IEEE Signal Process. Mag. 37(5), 43\u201354 (2020)","journal-title":"IEEE Signal Process. Mag."},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Park, H., Park, J., Dong, X., Teoh Beng-Jin, A.: Query efficient and generalizable black-box face reconstruction attack. In: 2023 IEEE International Conference on Image Processing (in press)","DOI":"10.1109\/ICIP49359.2023.10223034"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 815\u2013823 (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., Zafeiriou, S.: ArcFace: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4690\u20134699 (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Wang, H., et al.: CosFace: large margin cosine loss for deep face recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 5265\u20135274 (2018)","DOI":"10.1109\/CVPR.2018.00552"},{"issue":"1","key":"5_CR16","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MSP.2017.2764116","volume":"35","author":"R Ranjan","year":"2018","unstructured":"Ranjan, R., et al.: Deep learning for understanding faces: machines may be just as good, or better, than humans. IEEE Signal Process. Mag. 35(1), 66\u201383 (2018)","journal-title":"IEEE Signal Process. Mag."},{"key":"5_CR17","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.neucom.2020.10.081","volume":"429","author":"M Wang","year":"2021","unstructured":"Wang, M., Deng, W.: Deep face recognition: a survey. Neurocomputing 429, 215\u2013244 (2021)","journal-title":"Neurocomputing"},{"key":"5_CR18","unstructured":"Zhmoginov, A., Sandler, M.: Inverting face embeddings with convolutional neural networks. arXiv preprint arXiv:1606.04189 (2016)"},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"4184","DOI":"10.1109\/TIFS.2021.3103056","volume":"16","author":"D Keller","year":"2021","unstructured":"Keller, D., Osadchy, M., Dunkelman, O.: Inverting binarizations of facial templates produced by deep learning (and its implications). IEEE Trans. Inf. Forensics Secur. 16, 4184\u20134196 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Duong, C.N., et al.: Vec2Face: unveil human faces from their blackbox features in face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6132\u20136141 (2020)","DOI":"10.1109\/CVPR42600.2020.00617"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1007\/978-3-030-68238-5_34","volume-title":"Computer Vision \u2013 ECCV 2020 Workshops","author":"A Razzhigaev","year":"2020","unstructured":"Razzhigaev, A., Kireev, K., Kaziakhmedov, E., Tursynbek, N., Petiushko, A.: Black-box face recovery from identity features. In: Bartoli, A., Fusiello, A. (eds.) ECCV 2020. LNCS, vol. 12539, pp. 462\u2013475. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-68238-5_34"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Srinivas, M., Patnaik, L.M.: Genetic algorithms: a survey. Computer 27(6), 17\u201326 (1994)","DOI":"10.1109\/2.294849"},{"key":"5_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103026","volume":"125","author":"X Dong","year":"2023","unstructured":"Dong, X., et al.: Reconstruct face from features based on genetic algorithm using GAN generator as a distribution constraint. Comput. Secur. 125, 103026 (2023)","journal-title":"Comput. Secur."},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen, J., Aila, T.: Analyzing and improving the image quality of StyleGAN. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 8110\u20138119 (2020)","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Boyd, S.P., Vandenberghe, L.: Convex Optimization. Cambridge University Press (2004)","DOI":"10.1017\/CBO9780511804441"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Shmelkin, R., Friedlander, T., Wolf, L.: Generating master faces for dictionary attacks with a network-assisted latent space evolution. In: 2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021), pp. 01\u201308 (2021)","DOI":"10.1109\/FG52635.2021.9666968"},{"key":"5_CR27","doi-asserted-by":"publisher","unstructured":"Bock, H.-H.: Clustering methods: a history of k-means algorithms. In: Brito, P., Cucumel, G., Bertrand, P., de Carvalho, F. (eds.) Selected Contributions in Data Analysis and Classification, pp. 161\u2013172. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73560-1_15","DOI":"10.1007\/978-3-540-73560-1_15"},{"issue":"8","key":"5_CR28","doi-asserted-by":"publisher","first-page":"1295","DOI":"10.3390\/electronics9081295","volume":"9","author":"M Ahmed","year":"2020","unstructured":"Ahmed, M., Seraj, R., Islam, S.M.S.: The k-means algorithm: a comprehensive survey and performance evaluation. Electronics 9(8), 1295 (2020)","journal-title":"Electronics"},{"key":"5_CR29","unstructured":"Huang, G.B., Mattar, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. In: Workshop on Faces in \u2018Real-Life\u2019 Images: Detection, Alignment, and Recognition (2008)"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Sengupta, S., Chen, J.-C., Castillo, C., Patel, V.M., Chellappa, R., Jacobs, D.W.: Frontal to profile face verification in the wild. In: IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 1\u20139. IEEE (2016)","DOI":"10.1109\/WACV.2016.7477558"},{"key":"5_CR31","unstructured":"Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 (2015)"},{"key":"5_CR32","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"5_CR33","unstructured":"Dong, X., Jin, Z., Teoh, A.B.J., Tistarelli, M., Wong, K.: On the security risk of cancelable biometrics. arXiv preprint arXiv:1910.07770 (2019)"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8469-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,24]],"date-time":"2023-12-24T17:03:51Z","timestamp":1703437431000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8469-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,25]]},"ISBN":["9789819984688","9789819984695"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8469-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,25]]},"assertion":[{"value":"25 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/prcv2023.xmu.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1420","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"532","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,78","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,69","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}