{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T02:18:06Z","timestamp":1771294686038,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,1,8]],"date-time":"2021-01-08T00:00:00Z","timestamp":1610064000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,8]],"date-time":"2021-01-08T00:00:00Z","timestamp":1610064000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61602241"],"award-info":[{"award-number":["No. 61602241"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s12083-020-01031-z","type":"journal-article","created":{"date-parts":[[2021,1,8]],"date-time":"2021-01-08T14:03:29Z","timestamp":1610114609000},"page":"1458-1474","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2408-503X","authenticated-orcid":false,"given":"Mingfu","family":"Xue","sequence":"first","affiliation":[]},{"given":"Can","family":"He","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Weiqiang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,8]]},"reference":[{"issue":"1","key":"1031_CR1","doi-asserted-by":"publisher","first-page":"52","DOI":"10.26599\/TST.2018.9010033","volume":"24","author":"W Jiang","year":"2019","unstructured":"Jiang W, Zhang L (2019) Geospatial data to images: A deep-learning framework for traffic forecasting. Tsinghua Sci Technol 24(1):52\u201364","journal-title":"Tsinghua Sci Technol"},{"key":"1031_CR2","doi-asserted-by":"crossref","unstructured":"Pagano C, Granger E, Sabourin R, Gorodnichy D (2012) Detector ensembles for face recognition in video surveillance. In: International joint conference on neural networks, pp 1\u20138","DOI":"10.1109\/IJCNN.2012.6252659"},{"issue":"6","key":"1031_CR3","doi-asserted-by":"publisher","first-page":"663","DOI":"10.26599\/TST.2018.9010100","volume":"24","author":"Q Dang","year":"2019","unstructured":"Dang Q, Yin J, Wang B, Zheng W (2019) Deep learning based 2D human pose estimation: A survey. Tsinghua Sci Technol 24(6):663\u2013676","journal-title":"Tsinghua Sci Technol"},{"issue":"2","key":"1031_CR4","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1016\/j.patcog.2010.08.009","volume":"44","author":"K Choi","year":"2011","unstructured":"Choi K, Toh K-A, Byun H (2011) Realtime training on mobile devices for face recognition applications. Pattern Recogn 44(2):386\u2013400","journal-title":"Pattern Recogn"},{"key":"1031_CR5","doi-asserted-by":"crossref","unstructured":"Soyata T, Muraleedharan R, Funai C, Kwon M, Heinzelman WB (2012) Cloud-vision: Real-time face recognition using a mobile-cloudlet-cloud acceleration architecture. In: IEEE symposium on computers and communications, pp 59\u201366","DOI":"10.1109\/ISCC.2012.6249269"},{"key":"1031_CR6","unstructured":"Zou M, Shi Y, Wang C, Li F, Song W, Wang Y (2018) PoTrojan: Powerful neural-level Trojan designs in deep learning models. arXiv:1802.03043"},{"key":"1031_CR7","doi-asserted-by":"crossref","unstructured":"Liu Y, Ma S, Aafer Y, Lee W-C, Zhai J, Wang W, Zhang X (2018) Trojaning attack on neural networks. In: 25th Annual network and distributed system security symposium, pp 1\u201315","DOI":"10.14722\/ndss.2018.23291"},{"key":"1031_CR8","unstructured":"Gu T, Dolan-Gavitt B, Garg S (2017) Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv:1708.06733"},{"key":"1031_CR9","unstructured":"Li S, Zhao BZH, Yu J, Xue M, Kaafar D, Zhu H (2019) Invisible backdoor attacks against deep neural networks. arXiv:1909.02742"},{"key":"1031_CR10","doi-asserted-by":"crossref","unstructured":"Xue M, He C, Wang J, Liu W (2020) One-to-N & N-to-One: Two advanced backdoor attacks against deep learning models. IEEE Transactions on Dependable and Secure Computing, Early Access, pp 1\u201317","DOI":"10.1109\/TDSC.2020.3028448"},{"key":"1031_CR11","doi-asserted-by":"publisher","first-page":"74720","DOI":"10.1109\/ACCESS.2020.2987435","volume":"8","author":"M Xue","year":"2020","unstructured":"Xue M, Yuan C, Wu H, Zhang Y, Liu W (2020) Machine learning security: Threats, countermeasures, and evaluations. IEEE Access 8:74720\u201374742","journal-title":"IEEE Access"},{"key":"1031_CR12","unstructured":"Chen X, Liu C, Li B, Lu K, Song D (2017) Targeted backdoor attacks on deep learning systems using data poisoning. arXiv:1712.05526"},{"key":"1031_CR13","unstructured":"Wenger E, Passananti J, Yao Y, Zheng H, Zhao BY (2020) Backdoor attacks on facial recognition in the physical world. arXiv:2006.14580"},{"key":"1031_CR14","unstructured":"Sarkar E, Benkraouda H, Maniatakos M (2020) FaceHack: Triggering backdoored facial recognition systems using facial characteristics. arXiv:2006.11623"},{"key":"1031_CR15","unstructured":"Faceapp (2017). https:\/\/faceapp.com\/app"},{"key":"1031_CR16","doi-asserted-by":"crossref","unstructured":"He C, Xue M, Wang J, Liu W (2020) Embedding backdoors as the facial features: Invisible backdoor attacks against face recognition systems. In: Proceedings of ACM turing celebration conference - China, pp 231\u2013235","DOI":"10.1145\/3393527.3393567"},{"key":"1031_CR17","doi-asserted-by":"crossref","unstructured":"Sun Y, Wang X, Tang X (2014) Deep learning face representation from predicting 10,000 classes. In: IEEE conference on computer vision and pattern recognition, pp 1891\u20131898","DOI":"10.1109\/CVPR.2014.244"},{"key":"1031_CR18","doi-asserted-by":"crossref","unstructured":"Parkhi O M, Vedaldi A, Zisserman A (2015) Deep face recognition. In: Proceedings of the British machine vision conference, pp 1\u201312","DOI":"10.5244\/C.29.41"},{"issue":"4","key":"1031_CR19","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"1031_CR20","unstructured":"Wen Z, Zhu W, Ouyang J, Liu P, Du Y, Zhang M, Gao J (2011) A robust and discriminative image perceptual hash algorithm. In: Proceedings of the international conference on genetic and evolutionary computing, pp 709\u2013712"},{"key":"1031_CR21","doi-asserted-by":"crossref","unstructured":"Rakin AS, He Z, Fan D (2020) TBT: Targeted neural network attack with bit Trojan. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1\u201310","DOI":"10.1109\/CVPR42600.2020.01321"},{"key":"1031_CR22","doi-asserted-by":"crossref","unstructured":"Zhong H, Liao C, Squicciarini AC, Zhu S, Miller DJ (2020) Backdoor embedding in convolutional neural network models via invisible perturbation. In: Proceedings of the ACM conference on data and application security and privacy, pp 97\u2013108","DOI":"10.1145\/3374664.3375751"},{"key":"1031_CR23","unstructured":"Wang S, Nepal S, Rudolph C, Grobler M, Chen S, Chen T (2020) Backdoor attacks against transfer learning with pre-trained deep learning models. arXiv:2001.03274"},{"key":"1031_CR24","unstructured":"Chen B, Carvalho W, Baracaldo N, Ludwig H, Edwards B, Lee T, Molloy I, Srivastava B (2019) Detecting backdoor attacks on deep neural networks by activation clustering. In: Proceedings of the 33th AAAI conference on artificial intelligence, pp 1\u201310"},{"key":"1031_CR25","doi-asserted-by":"crossref","unstructured":"Liu K, Dolan-Gavitt B, Garg S (2018) Fine-pruning: Defending against backdooring attacks on deep neural networks. In: Proceedings of the 21st international symposium on attacks, intrusions and defenses, pp 273\u2013294","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"1031_CR26","doi-asserted-by":"crossref","unstructured":"Wang B, Yao Y, Shan S, Li H, Viswanath B, Zheng H, Zhao B Y (2019) Neural cleanse: Identifying and mitigating backdoor attacks in neural networks. In: IEEE symposium on security and privacy, pp 707\u2013723","DOI":"10.1109\/SP.2019.00031"},{"key":"1031_CR27","unstructured":"Udeshi S, Peng S, Woo G, Loh L, Rawshan L, Chattopadhyay S (2020) FaceHack: Triggering backdoored facial recognition systems using facial characteristics. arXiv:2006.11623"},{"key":"1031_CR28","doi-asserted-by":"crossref","unstructured":"Gao Y, Xu C, Wang D, Chen S, Ranasinghe DC, Nepal S (2019) STRIP: A defence against Trojan attacks on deep neural networks. In: Proceedings of the 35th annual computer security applications conference, pp 113\u2013125","DOI":"10.1145\/3359789.3359790"},{"key":"1031_CR29","doi-asserted-by":"crossref","unstructured":"Arsenovic M, Sladojevic S, Anderla A, Stefanovic D (2017) Facetime: Deep learning based face recognition attendance system. In: IEEE 15th international symposium on intelligent systems and informatics, pp 53\u201358","DOI":"10.1109\/SISY.2017.8080587"},{"key":"1031_CR30","doi-asserted-by":"crossref","unstructured":"Insider threats as the main security threat in 2017 (2017). https:\/\/www.tripwire.com\/state-of-security\/security-data-protection\/insider-threats-main-security-threat-2017\/","DOI":"10.1016\/S1361-3723(17)30063-5"},{"key":"1031_CR31","unstructured":"The insider versus the outsider: Who poses the biggest security risk? (2015). https:\/\/www.helpnetsecurity.com\/2015\/08\/19\/theinsider-versus-the-outsider-who-poses-the-biggest-security-risk\/"},{"key":"1031_CR32","first-page":"1755","volume":"10","author":"DE King","year":"2009","unstructured":"King DE (2009) Dlib-ml: A machine learning toolkit. J Mach Learn Res 10:1755\u20131758","journal-title":"J Mach Learn Res"},{"key":"1031_CR33","doi-asserted-by":"crossref","unstructured":"Wolf L, Hassner T, Maoz I (2011) Face recognition in unconstrained videos with matched background similarity. In: IEEE conference on computer vision and pattern recognition, pp 529\u2013 534","DOI":"10.1109\/CVPR.2011.5995566"},{"key":"1031_CR34","unstructured":"MTLab (2020). http:\/\/mtlab.meitu.com\/en\/index"},{"issue":"2","key":"1031_CR35","doi-asserted-by":"publisher","first-page":"226","DOI":"10.26599\/TST.2018.9010114","volume":"24","author":"G Xi","year":"2019","unstructured":"Xi G, Zhao X, Liu Y, Huang J, Deng Y (2019) A hierarchical ensemble learning framework for energy-efficient automatic train driving. Tsinghua Sci Technol 24(2):226\u2013237","journal-title":"Tsinghua Sci Technol"},{"key":"1031_CR36","doi-asserted-by":"crossref","unstructured":"Yao Y, Li H, Zheng H, Zhao BY (2019) Latent backdoor attacks on deep neural networks. In: Proceedings of the ACM SIGSAC conference on computer and communications security, pp 2041\u20132055","DOI":"10.1145\/3319535.3354209"},{"key":"1031_CR37","unstructured":"Doan BG, Abbasnejad E, Ranasinghe DC (2019) Februus: Input purification defense against Trojan attacks on deep neural network systems. arXiv:1908.03369"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-01031-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-020-01031-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-01031-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,11]],"date-time":"2022-12-11T01:17:14Z","timestamp":1670721434000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-020-01031-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,8]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["1031"],"URL":"https:\/\/doi.org\/10.1007\/s12083-020-01031-z","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,8]]},"assertion":[{"value":"30 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}