{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T04:03:27Z","timestamp":1750997007068,"version":"3.41.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Process Lett"],"DOI":"10.1007\/s11063-025-11756-8","type":"journal-article","created":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T05:54:58Z","timestamp":1746424498000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Lights, Camera, Adversary: Decoding the Enigmatic World of Malicious Frames in Real-Time Video Surveillance Systems"],"prefix":"10.1007","volume":"57","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3306-5671","authenticated-orcid":false,"given":"Burhan ul Haque","family":"Sheikh","sequence":"first","affiliation":[]},{"given":"Aasim","family":"Zafar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,5]]},"reference":[{"key":"11756_CR1","doi-asserted-by":"publisher","first-page":"1102","DOI":"10.1016\/j.procs.2023.01.089","volume":"218","author":"MF Nurnoby","year":"2023","unstructured":"Nurnoby MF, Helmy T (2023) A real-time deep learning-based smart surveillance using fog computing: a complete architecture. Procedia Comput Sci 218:1102\u20131111. https:\/\/doi.org\/10.1016\/j.procs.2023.01.089","journal-title":"Procedia Comput Sci"},{"key":"11756_CR2","doi-asserted-by":"publisher","first-page":"100656","DOI":"10.1016\/j.iot.2022.100656","volume":"21","author":"A Abusitta","year":"2023","unstructured":"Abusitta A, de Carvalho GH, Wahab OA, Halabi T, Fung BC, Mamoori SA (2023) Deep learning-enabled anomaly detection for IoT systems. Internet of Things 21:100656. https:\/\/doi.org\/10.1016\/j.iot.2022.100656","journal-title":"Internet of Things"},{"key":"11756_CR3","doi-asserted-by":"publisher","unstructured":"Lingani GM, Rawat DB, Garuba M (2019) Smart traffic management system using deep learning for smart city applications. 2019 IEEE 9th annual computing and communication workshop and conference (CCWC). https:\/\/doi.org\/10.1109\/ccwc.2019.8666539","DOI":"10.1109\/ccwc.2019.8666539"},{"key":"11756_CR4","doi-asserted-by":"publisher","unstructured":"Mohsin J, Saleh FH, Ali Al-muqarm AM (2020) Real-time surveillance system to detect and analyzers the suspects of COVID-19 patients by using IoT under edge computing techniques (RS-SYS). In: 2020 2nd Al-Noor International Conference for Science and Technology (NICST). https:\/\/doi.org\/10.1109\/nicst50904.2020.9280305","DOI":"10.1109\/nicst50904.2020.9280305"},{"key":"11756_CR5","doi-asserted-by":"publisher","first-page":"108908","DOI":"10.1016\/j.patcog.2022.108908","volume":"132","author":"C Wang","year":"2022","unstructured":"Wang C, Wang X, Wang Z, Zhu W, Hu R (2022) COVID-19 contact tracking by group activity trajectory recovery over camera networks. Pattern Recog 132:108908. https:\/\/doi.org\/10.1016\/j.patcog.2022.108908","journal-title":"Pattern Recog"},{"key":"11756_CR6","doi-asserted-by":"publisher","first-page":"108289","DOI":"10.1016\/j.patcog.2021.108289","volume":"122","author":"G Deshpande","year":"2022","unstructured":"Deshpande G, Batliner A, Schuller BW (2022) AI-Based human audio processing for COVID-19: a comprehensive overview. Pattern Recog 122:108289. https:\/\/doi.org\/10.1016\/j.patcog.2021.108289","journal-title":"Pattern Recog"},{"key":"11756_CR7","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/s42979-023-01738-9","volume":"4","author":"B Sheikh","year":"2023","unstructured":"Sheikh B, Zafar A (2023) RRFMDS: Rapid real-time face mask detection system for effective COVID-19 monitoring. Sn Comput Sci 4:288. https:\/\/doi.org\/10.1007\/s42979-023-01738-9","journal-title":"Sn Comput Sci"},{"key":"11756_CR8","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R, Intriguing properties of neural networks. arXiv 2013, arXiv:1312.6199"},{"key":"11756_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-023-01538-7","author":"B Sheikh","year":"2023","unstructured":"Sheikh B, Zafar A (2023) White-box inference attack: compromising the security of deep learning -based COVID-19 detection systems. Int J Inf Tecnol. https:\/\/doi.org\/10.1007\/s41870-023-01538-7","journal-title":"Int J Inf Tecnol"},{"key":"11756_CR10","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/s10278-023-00916-8","volume":"37","author":"SBU Haque","year":"2024","unstructured":"Haque SBU, Zafar A (2024) Robust Medical diagnosis: a novel two-phase deep learning framework for adversarial proof disease detection in radiology images. J Imag Inf Med 37:308\u2013338. https:\/\/doi.org\/10.1007\/s10278-023-00916-8","journal-title":"J Imag Inf Med"},{"key":"11756_CR11","doi-asserted-by":"publisher","first-page":"107332","DOI":"10.1016\/j.patcog.2020.107332","volume":"110","author":"X Ma","year":"2021","unstructured":"Ma X, Niu Y, Gu L, Wang Y, Zhao Y, Bailey J, Lu F (2021) Understanding adversarial attacks on deep learning based medical image analysis systems. Pattern Recog 110:107332. https:\/\/doi.org\/10.1016\/j.patcog.2020.107332","journal-title":"Pattern Recog"},{"issue":"10","key":"11756_CR12","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang K, Zhang Z, Li Z, Qiao Y (2016) Joint face detection and alignment using multi-task cascaded convolutional networks. IEEE Signal Process Lett 23(10):1499\u20131503. https:\/\/doi.org\/10.1109\/LSP.2016.2603342","journal-title":"IEEE Signal Process Lett"},{"key":"11756_CR13","unstructured":"Howard AG, Zhu M, Chen B, Kalenichenko D, Wang W, Weyand T, Adam H (2017) Mobilenets: Efficient convolutional neural networks for mobile vision applications.\u00a0arXiv preprint arXiv:1704.04861"},{"key":"11756_CR14","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples.\u00a0CoRR, abs\/1412.6572"},{"key":"11756_CR15","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2017) Towards deep learning models resistant to adversarial attacks.\u00a0arXiv preprint arXiv:1706.06083"},{"key":"11756_CR16","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1201\/9781351251389-8","volume-title":"Artificial intelligence safety and security","author":"A Kurakin","year":"2018","unstructured":"Kurakin A, Goodfellow IJ, Bengio S (2018) Adversarial examples in the physical world. Artificial intelligence safety and security. Chapman and Hall\/CRC, London, pp 99\u2013112"},{"key":"11756_CR17","doi-asserted-by":"publisher","unstructured":"Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 IEEE symposium on security and privacy (SP). https:\/\/doi.org\/10.1109\/sp.2017.49","DOI":"10.1109\/sp.2017.49"},{"issue":"1","key":"11756_CR18","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.11591\/ijai.v13.i1.pp1030-1037","volume":"13","author":"SB UlHaque","year":"2024","unstructured":"UlHaque SB, Wani MH (2024) Sophisticated face mask dataset: a novel dataset for effective coronavirus disease surveillance. Int J Intel 13(1):1030. https:\/\/doi.org\/10.11591\/ijai.v13.i1.pp1030-1037","journal-title":"Int J Intel"},{"key":"11756_CR19","doi-asserted-by":"publisher","unstructured":"Moosavi-Dezfooli SM, Fawzi A, Fawzi O, Frossard P (2017) Universal adversarial perturbations. In: 2017 IEEE conference on computer vision and pattern recognition (CVPR). https:\/\/doi.org\/10.1109\/cvpr.2017.17.","DOI":"10.1109\/cvpr.2017.17"},{"key":"11756_CR20","doi-asserted-by":"publisher","unstructured":"Papernot N, McDaniel P, Goodfellow I, Jha S, Celik ZB, Swami A (2017) Practical black-box attacks against machine learning. In: Proceedings of the 2017 ACM on Asia conference on computer and communications security. https:\/\/doi.org\/10.1145\/3052973.305300","DOI":"10.1145\/3052973.305300"},{"key":"11756_CR21","unstructured":"Ilyas A, Engstrom L, Athalye A, Lin J (2018) Black-box adversarial attacks with limited queries and information. In: International conference on machine learning. PMLR, pp 2137\u20132146"},{"key":"11756_CR22","doi-asserted-by":"publisher","unstructured":"Gao J, Lanchantin J, Soffa ML, Qi Y (2018) Black-Box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers. In: 2018 IEEE Security and Privacy Workshops (SPW). https:\/\/doi.org\/10.1109\/spw.2018.00016","DOI":"10.1109\/spw.2018.00016"},{"key":"11756_CR23","doi-asserted-by":"publisher","unstructured":"Chen PY, Zhang H, Sharma Y, Yi J, Hsieh CJ (2017) ZOO. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security. https:\/\/doi.org\/10.1145\/3128572.3140448","DOI":"10.1145\/3128572.3140448"},{"key":"11756_CR24","doi-asserted-by":"crossref","unstructured":"Wei X, Zhu J, Su H (2019) Sparse adversarial perturbations for videos. CoRR abs\/1803.02536","DOI":"10.1609\/aaai.v33i01.33018973"},{"key":"11756_CR25","doi-asserted-by":"crossref","unstructured":"Li S, Neupane A, Paul S, Song C, Krishnamurthy SV, Roy-Chowdhury AK, Swami A (2018) Stealthy adversarial perturbations against real-time video classification systems. CoRR abs\/1807.00458","DOI":"10.14722\/ndss.2019.23202"},{"key":"11756_CR26","unstructured":"Inkawhich N, Inkawhich M, Li H, Chen Y (2019) Adversarial attacks for optical flow-based action recognition classifiers."},{"key":"11756_CR27","doi-asserted-by":"crossref","unstructured":"Thys S, Van Ranst W, Goedem\u00e9 T (2019) Fooling automated surveillance cameras: adversarial patches to attack person detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops. pp. 0\u20130","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"11756_CR28","doi-asserted-by":"crossref","unstructured":"Deng J, Dong W, Socher R, Li LJ, Li K, Fei-Fei L (2009) Imagenet: a large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition. IEEE, pp 248-255","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"11756_CR29","unstructured":"Qi G, Gong L, Song Y, Ma K, Zheng Y (2021) Stabilized medical image attacks. arXiv preprint arXiv :2103.05232"},{"key":"11756_CR30","doi-asserted-by":"publisher","first-page":"24789","DOI":"10.1007\/s11042-023-16439-x","volume":"83","author":"BUH Sheikh","year":"2023","unstructured":"Sheikh BUH, Zafar A (2023) Unlocking adversarial transferability: a security threat towards deep learning-based surveillance systems via black box inference attack- a case study on face mask surveillance. Multimed Tools Appl 83:24789\u201324775. https:\/\/doi.org\/10.1007\/s11042-023-16439-x","journal-title":"Multimed Tools Appl"},{"key":"11756_CR31","doi-asserted-by":"publisher","DOI":"10.21203\/rs.3.rs-763355\/v1","author":"RA Gougeh","year":"2021","unstructured":"Gougeh RA (2021) How adversarial attacks afect deep neural networks detecting COVID-19? Res Sq. https:\/\/doi.org\/10.21203\/rs.3.rs-763355\/v1","journal-title":"Res Sq"},{"key":"11756_CR32","doi-asserted-by":"crossref","unstructured":"Thys S, Van Ranst W, & Goedem\u00e9 T (2019) Fooling automated surveillance cameras: adversarial patches to attack person detection. In: Proceedings of the IEEE Conference on computer vision and pattern recognition workshops (CVPRW)","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"11756_CR33","doi-asserted-by":"publisher","unstructured":"Wani MH, Faridi AR (2022) Deep learning-based video action recognition: a review. 2022 International conference on computing, communication, and intelligent systems (ICCCIS). https:\/\/doi.org\/10.1109\/icccis56430.2022.10037736","DOI":"10.1109\/icccis56430.2022.10037736"},{"key":"11756_CR34","doi-asserted-by":"publisher","unstructured":"Wani MH, Faridi AR (2023) Deep hybrid architecture for suspicious action detection in video surveillance. 2023 3rd International conference on technological advancements in computational sciences (ICTACS). https:\/\/doi.org\/10.1109\/ictacs59847.2023.10389884","DOI":"10.1109\/ictacs59847.2023.10389884"},{"key":"11756_CR35","doi-asserted-by":"publisher","unstructured":"Upmanyu M, Namboodiri AM, Srinathan K, Jawahar CV (2009) Efficient privacy preserving video surveillance. In: 2009 IEEE 12th International Conference on Computer Vision. Kyoto, Japan, pp 1639\u20131646. https:\/\/doi.org\/10.1109\/ICCV.2009.5459370.","DOI":"10.1109\/ICCV.2009.5459370"},{"key":"11756_CR36","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s40747-022-00783-w","volume":"9","author":"A Gupta","year":"2023","unstructured":"Gupta A, Prabhat P (2023) Towards a resource efficient and privacy-preserving framework for campus-wide video analytics-based applications. Complex Intell Syst 9:161\u2013176. https:\/\/doi.org\/10.1007\/s40747-022-00783-w","journal-title":"Complex Intell Syst"},{"key":"11756_CR37","doi-asserted-by":"publisher","first-page":"111909","DOI":"10.1016\/j.asoc.2024.111909","volume":"163","author":"BUH Sheikh","year":"2024","unstructured":"Sheikh BUH (2024) Denoiser and fuzzy image transformation based approach to remove adversarial noise for reliable deep diagnosis of CT images. Appl Soft Comput 163:111909. https:\/\/doi.org\/10.1016\/j.asoc.2024.111909","journal-title":"Appl Soft Comput"}],"container-title":["Neural Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-025-11756-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11063-025-11756-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-025-11756-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T05:57:59Z","timestamp":1750917479000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11063-025-11756-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":37,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["11756"],"URL":"https:\/\/doi.org\/10.1007\/s11063-025-11756-8","relation":{},"ISSN":["1573-773X"],"issn-type":[{"type":"electronic","value":"1573-773X"}],"subject":[],"published":{"date-parts":[[2025,5,5]]},"assertion":[{"value":"17 March 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"46"}}