{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T15:32:10Z","timestamp":1772811130646,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T00:00:00Z","timestamp":1661212800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T00:00:00Z","timestamp":1661212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai","doi-asserted-by":"publisher","award":["No. 20ZR1419900"],"award-info":[{"award-number":["No. 20ZR1419900"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008838","name":"Shanghai Municipal Commission of Economy and Informatization","doi-asserted-by":"publisher","award":["No.21511102605"],"award-info":[{"award-number":["No.21511102605"]}],"id":[{"id":"10.13039\/501100008838","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s11042-022-13641-1","type":"journal-article","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T05:02:35Z","timestamp":1661230955000},"page":"7443-7461","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["ApaNet: adversarial perturbations alleviation network for face verification"],"prefix":"10.1007","volume":"82","author":[{"given":"Guangling","family":"Sun","sequence":"first","affiliation":[]},{"given":"Haoqi","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Yuying","family":"Su","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7412-4290","authenticated-orcid":false,"given":"Xiaofeng","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"issue":"2","key":"13641_CR1","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.1007\/s10462-019-09689-5","volume":"52","author":"F Becerra-Riera","year":"2019","unstructured":"Becerra-Riera F, Morales-Gonz\u00e1lez A, M\u00e9ndez-V\u00e1zquez H (2019) A survey on facial soft biometrics for video surveillance and forensic applications. Artif Intell Rev 52(2):1155\u20131187","journal-title":"Artif Intell Rev"},{"key":"13641_CR2","doi-asserted-by":"crossref","unstructured":"Boutros F, Siebke P, Klemt M, Damer N, Kirchbuchner F, Kuijper A (2021) Pocketnet: extreme lightweight face recognition network using neural architecture search and multi-step knowledge distillation. arXiv preprint arXiv:2108.10710","DOI":"10.1109\/ACCESS.2022.3170561"},{"key":"13641_CR3","doi-asserted-by":"crossref","unstructured":"Chhabra S, Singh R, Vatsa M, Gupta G (2018) Anonymizing k-facial attributes via adversarial perturbations. arXiv preprint arXiv:1805.09380","DOI":"10.24963\/ijcai.2018\/91"},{"key":"13641_CR4","doi-asserted-by":"crossref","unstructured":"Dabouei A, Soleymani S, Dawson J, Nasrabadi N (2019) Fast geometrically-perturbed adversarial faces. In: 2019 IEEE Winter Conference on Applications of Computer Vision (WACV), pp 1979\u20131988","DOI":"10.1109\/WACV.2019.00215"},{"key":"13641_CR5","unstructured":"Deb D, Liu X, Jain AK (2020) Faceguard: a self-supervised defense against adversarial face images. arXiv preprint arXiv:2011.14218"},{"key":"13641_CR6","doi-asserted-by":"crossref","unstructured":"Duan R, Ma X, Wang Y, Bailey J, Qin A K, Yang Y (2020) Adversarial camouflage: hiding physical-world attacks with natural styles. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 1000\u20131008","DOI":"10.1109\/CVPR42600.2020.00108"},{"issue":"14","key":"13641_CR7","doi-asserted-by":"publisher","first-page":"20409","DOI":"10.1007\/s11042-019-7353-6","volume":"78","author":"W Fan","year":"2019","unstructured":"Fan W, Sun G, Su Y, Liu Z, Lu X (2019) Integration of statistical detector and gaussian noise injection detector for adversarial example detection in deep neural networks. Multimed Tools Appl 78(14):20409\u201320429","journal-title":"Multimed Tools Appl"},{"key":"13641_CR8","doi-asserted-by":"crossref","unstructured":"Goel A, Singh A, Agarwal A, Vatsa M, Singh R (2018) Smartbox: benchmarking adversarial detection and mitigation algorithms for face recognition. In: 2018 IEEE 9th international conference on biometrics theory, applications and systems (BTAS), pp 1-7","DOI":"10.1109\/BTAS.2018.8698567"},{"key":"13641_CR9","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572"},{"key":"13641_CR10","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. Adv Neural Inf Proces Syst 27"},{"issue":"6","key":"13641_CR11","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/s11263-019-01160-w","volume":"127","author":"G Goswami","year":"2019","unstructured":"Goswami G, Agarwal A, Ratha N, Singh R, Vatsa M (2019) Detecting and mitigating adversarial perturbations for robust face recognition. Int J Comput Vis 127(6):719\u2013742","journal-title":"Int J Comput Vis"},{"key":"13641_CR12","doi-asserted-by":"crossref","unstructured":"Guo Y, Zhang L, Hu Y, He X, Gao J (2016) Ms-celeb-1m: a dataset and benchmark for large-scale face recognition. In: European conference on computer vision\u00a0(ECCV), pp 87\u2013102","DOI":"10.1007\/978-3-319-46487-9_6"},{"key":"13641_CR13","unstructured":"Guo C, Rana M, Cisse M, Van Der Maaten L (2017) Countering adversarial images using input transformations. arXiv preprint arXiv:1711.00117"},{"key":"13641_CR14","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.1109\/TCSVT.2021.3074259","volume":"32","author":"J Hu","year":"2021","unstructured":"Hu J, Liao X, Wang W, Qin Z (2021) Detecting compressed deepfake videos in social networks using frame-temporality two-stream convolutional network. IEEE Trans Circuits Syst Video Technol 32:1089\u20131102","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"13641_CR15","unstructured":"Huang G B, Mattar M, Berg T, Learned-Miller E (2008) Labeled faces in the wild: a database forstudying face recognition in unconstrained environments. In: Workshop on faces in'Real-Life'Images: detection, alignment, and recognition, pp"},{"key":"13641_CR16","doi-asserted-by":"crossref","unstructured":"Jia X, Wei X, Cao X, Foroosh H (2019) Comdefend: an efficient image compression model to defend adversarial examples. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 6084\u20136092","DOI":"10.1109\/CVPR.2019.00624"},{"key":"13641_CR17","doi-asserted-by":"crossref","unstructured":"Kumar A, Singh N, Kumar P, Vijayvergia A, Kumar K (2017) A novel superpixel based color spatial feature for salient object detection. In: 2017 conference on information and communication technology (CICT), pp 1-5","DOI":"10.1109\/INFOCOMTECH.2017.8340630"},{"key":"13641_CR18","doi-asserted-by":"crossref","unstructured":"Kumar K, Kumar A, Bahuguna A (2017) D-cad: deep and crowded anomaly detection. In: Proceedings of the 7th international conference on computer and communication technology, pp 100-105","DOI":"10.1145\/3154979.3154998"},{"key":"13641_CR19","unstructured":"Li Y, Li L, Wang L, Zhang T, Gong B (2019) Nattack: learning the distributions of adversarial examples for an improved black-box attack on deep neural networks. In: International Conference on Machine Learning, pp. 3866\u20133876"},{"key":"13641_CR20","doi-asserted-by":"crossref","unstructured":"Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Dependable Secure Comput","DOI":"10.1109\/TDSC.2020.3004708"},{"issue":"5","key":"13641_CR21","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1109\/JSTSP.2020.3002391","volume":"14","author":"X Liao","year":"2020","unstructured":"Liao X, Li K, Zhu X, Liu KR (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Sel Top Signal Process 14(5):955\u2013968","journal-title":"IEEE J Sel Top Signal Process"},{"key":"13641_CR22","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2017) Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083"},{"key":"13641_CR23","doi-asserted-by":"publisher","first-page":"103103","DOI":"10.1016\/j.cviu.2020.103103","volume":"202","author":"FV Massoli","year":"2021","unstructured":"Massoli FV, Carrara F, Amato G, Falchi F (2021) Detection of face recognition adversarial attacks. Comput Vis Image Underst 202:103103","journal-title":"Comput Vis Image Underst"},{"key":"13641_CR24","doi-asserted-by":"crossref","unstructured":"Mirjalili V, Ross A (2017) Soft biometric privacy: retaining biometric utility of face images while perturbing gender. In: 2017 IEEE international joint conference on biometrics (IJCB), pp 564-573","DOI":"10.1109\/BTAS.2017.8272743"},{"key":"13641_CR25","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli S-M, Fawzi A, Frossard P (2016) Deepfool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2574\u20132582","DOI":"10.1109\/CVPR.2016.282"},{"key":"13641_CR26","doi-asserted-by":"crossref","unstructured":"Negi A, Chauhan P, Kumar K, Rajput R (2020) Face mask detection classifier and model pruning with keras-surgeon. In: 2020 5th IEEE international conference on recent advances and innovations in engineering (ICRAIE), pp 1-6","DOI":"10.1109\/ICRAIE51050.2020.9358337"},{"key":"13641_CR27","doi-asserted-by":"crossref","unstructured":"Negi A, Kumar K, Chaudhari N S, Singh N, Chauhan P (2021) Predictive analytics for recognizing human activities using residual network and fine-tuning. In: International Conference on Big Data Analytics, pp. 296\u2013310","DOI":"10.1007\/978-3-030-93620-4_21"},{"key":"13641_CR28","doi-asserted-by":"crossref","unstructured":"Papernot N, McDaniel P, Wu X, Jha S, Swami A (2016) Distillation as a defense to adversarial perturbations against deep neural networks. In: 2016 IEEE symposium on security and privacy (SP), pp 582-597","DOI":"10.1109\/SP.2016.41"},{"key":"13641_CR29","unstructured":"Papernot N, McDaniel P, Goodfellow I (2016) Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. arXiv preprint arXiv:1605.07277"},{"issue":"3","key":"13641_CR30","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.eng.2019.12.012","volume":"6","author":"K Ren","year":"2020","unstructured":"Ren K, Zheng T, Qin Z, Liu X (2020) Adversarial attacks and defenses in deep learning. Engineering 6(3):346\u2013360","journal-title":"Engineering"},{"key":"13641_CR31","doi-asserted-by":"crossref","unstructured":"Rozsa A, G\u00fcnther M, Rudd E M, Boult T E (2016) Are facial attributes adversarially robust? In: 2016 23rd International Conference on Pattern Recognition (ICPR), pp 3121\u20133127","DOI":"10.1109\/ICPR.2016.7900114"},{"key":"13641_CR32","doi-asserted-by":"crossref","unstructured":"Rozsa A, G\u00fcnther M, Boult TE (2017) Lots about attacking deep features. In: 2017 IEEE International Joint Conference on Biometrics (IJCB), pp 168\u2013176","DOI":"10.1109\/BTAS.2017.8272695"},{"key":"13641_CR33","doi-asserted-by":"crossref","unstructured":"Schroff F, Kalenichenko D, Philbin J (2015) Facenet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 815\u2013823.","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"13641_CR34","doi-asserted-by":"crossref","unstructured":"Sharif M, Bhagavatula S, Bauer L, Reiter MK (2016) Accessorize to a crime: real and stealthy attacks on state-of-the-art face recognition. In: Proceedings of the 2016 acm sigsac conference on computer and communications security, pp 1528-1540","DOI":"10.1145\/2976749.2978392"},{"issue":"17","key":"13641_CR35","doi-asserted-by":"publisher","first-page":"26319","DOI":"10.1007\/s11042-021-10768-5","volume":"80","author":"S Sharma","year":"2021","unstructured":"Sharma S, Kumar K (2021) Asl-3dcnn: American sign language recognition technique using 3-d convolutional neural networks. Multimed Tools Appl 80(17):26319\u201326331","journal-title":"Multimed Tools Appl"},{"key":"13641_CR36","doi-asserted-by":"crossref","unstructured":"Sharma S, Kumar K, Singh N (2017) D-Fes: deep facial expression recognition system. In: 2017 conference on information and communication technology (CICT), pp 1-6","DOI":"10.1109\/INFOCOMTECH.2017.8340635"},{"key":"13641_CR37","doi-asserted-by":"crossref","unstructured":"Sriram S, Simran K, Vinayakumar R, Akarsh S, Soman K (2019) Towards evaluating the robustness of deep intrusion detection models in adversarial environment. In: International Symposium on Security in Computing and Communication, pp. 111\u2013120","DOI":"10.1007\/978-981-15-4825-3_9"},{"key":"13641_CR38","doi-asserted-by":"crossref","unstructured":"Stutz D, Hein M, Schiele B (2019) Disentangling adversarial robustness and generalization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6976\u20136987","DOI":"10.1109\/CVPR.2019.00714"},{"key":"13641_CR39","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199"},{"key":"13641_CR40","doi-asserted-by":"crossref","unstructured":"Szegedy C, Ioffe S, Vanhoucke V, Alemi AA (2017) Inception-v4, inception-resnet and the impact of residual connections on learning. In: Thirty-first AAAI conference on artificial intelligence, pp","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"13641_CR41","doi-asserted-by":"crossref","unstructured":"Taigman Y, Yang M, Ranzato MA, Wolf L (2014) Deepface: closing the gap to human-level performance in face verification. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1701-1708","DOI":"10.1109\/CVPR.2014.220"},{"key":"13641_CR42","unstructured":"Tram\u00e8r F, Kurakin A, Papernot N, Goodfellow I, Boneh D, McDaniel P (2017) Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204"},{"key":"13641_CR43","doi-asserted-by":"crossref","unstructured":"Wang H, Wang Y, Zhou Z, Ji X, Gong D, Zhou J, Li Z, Liu W (2018) Cosface: large margin cosine loss for deep face recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 5265\u20135274","DOI":"10.1109\/CVPR.2018.00552"},{"key":"13641_CR44","doi-asserted-by":"crossref","unstructured":"Wolf L, Hassner T, Maoz I (2011) Face recognition in unconstrained videos with matched background similarity. In: CVPR 2011, pp. 529\u2013534","DOI":"10.1109\/CVPR.2011.5995566"},{"key":"13641_CR45","unstructured":"Xie C, Wang J, Zhang Z, Ren Z, Yuille A (2017) Mitigating adversarial effects through randomization. arXiv preprint arXiv:1711.01991"},{"key":"13641_CR46","unstructured":"Xie C, Tan M, Gong B, Yuille A, Le Q V (2020) Smooth adversarial training. arXiv preprint arXiv:2006.14536"},{"key":"13641_CR47","unstructured":"Yi D, Lei Z, Liao S, Li SZ (2014) Learning face representation from scratch. arXiv preprint arXiv:1411.7923"},{"issue":"9","key":"13641_CR48","doi-asserted-by":"publisher","first-page":"2805","DOI":"10.1109\/TNNLS.2018.2886017","volume":"30","author":"X Yuan","year":"2019","unstructured":"Yuan X, He P, Zhu Q, Li X (2019) Adversarial examples: attacks and defenses for deep learning. IEEE Trans Neural Netw Learn Syst 30(9):2805\u20132824","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"10","key":"13641_CR49","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang K, Zhang Z, Li Z, Qiao Y (2016) Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process Lett 23(10):1499\u20131503","journal-title":"IEEE Signal Process Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13641-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13641-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13641-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:16:28Z","timestamp":1744204588000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13641-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,23]]},"references-count":49,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["13641"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13641-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,23]]},"assertion":[{"value":"1 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}