{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T16:11:43Z","timestamp":1777565503280,"version":"3.51.4"},"reference-count":159,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea (NRF) Grant","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Korean Government","award":["RS-2022-00165648"],"award-info":[{"award-number":["RS-2022-00165648"]}]},{"DOI":"10.13039\/501100013993","name":"2024 Hongik University Research Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100013993","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3439741","type":"journal-article","created":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T17:53:24Z","timestamp":1723053204000},"page":"116693-116710","source":"Crossref","is-referenced-by-count":10,"title":["A Comprehensive Risk Analysis Method for Adversarial Attacks on Biometric Authentication Systems"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6088-0658","authenticated-orcid":false,"given":"Seong Hee","family":"Park","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Hongik University, Seoul, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6696-0387","authenticated-orcid":false,"given":"Soo-Hyun","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Hongik University, Seoul, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Min Young","family":"Lim","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Hongik University, Seoul, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8138-798X","authenticated-orcid":false,"given":"Pyo Min","family":"Hong","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Hongik University, Seoul, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4569-2640","authenticated-orcid":false,"given":"Youn Kyu","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Hongik University, Seoul, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10237-x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61657-5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-020-0490-z"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12028"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2426728"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68780-9_42"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3092646"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66415-2_9"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98795-4_8"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2894031"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3510548.3519369"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2021.1978149"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3127960"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/app9050909"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-019-1211-x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3115465"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/app122211460"},{"key":"ref19","first-page":"376","article-title":"Autonomous synergy with biometric security and liveness detection","volume-title":"Proc. Sci. Inf. Conf.","author":"Matthew"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.11.117"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref22","article-title":"Learning face representation from scratch","author":"Yi","year":"2014","journal-title":"arXiv:1411.7923"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3208131"},{"key":"ref25","article-title":"AdvBiom: Adversarial attacks on biometric matchers","author":"Deb","year":"2023","journal-title":"arXiv:2301.03966"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/173"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102046"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICECDS.2017.8389533"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0324-5_7"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3600179"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24210"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE45552.2021.9576300"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1117\/12.2223429"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2019.00081"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00025"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-71381-2_9"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3226503"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3604992"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.7439\/ijasr.v1i7.1975"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2020.07.024"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1063\/5.0110607"},{"issue":"3","key":"ref43","first-page":"2742","article-title":"Vulnerability of biometric authentication system","volume":"5","author":"Emmanuel","year":"2016","journal-title":"Int. J. Innov. Res. Sci., Eng. Technol."},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3239387"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.18178\/ijsps.6.4.27-30"},{"issue":"5","key":"ref46","first-page":"2011","article-title":"Liveness detection in different biometric traits: An overview","volume":"8","author":"Kant","year":"2017","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-020-00425-3"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2023.06.014"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2889996"},{"issue":"3","key":"ref50","first-page":"2","article-title":"Analyzing 2D & 3D fingerprint recognition techniques as secure biometric","volume":"3","author":"Jagdev","journal-title":"Hand"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW54805.2022.00038"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107569"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398819"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2020.2968933"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-023-01070-5"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58808-7_2"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2933241"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-8297-4_67"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29407-6_33"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29407-6_55"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4938-9"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24369-6_46"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09281-y"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2021.10.015"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00004"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987399"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3376897.3377856"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP55362.2022.9949122"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987267"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412236"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00790"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2018.8547128"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00415"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB48548.2020.9304898"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8803269"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3036801"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/SIBIRCON48586.2019.8958134"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.12341"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2020.103103"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-019-01160-w"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09604-z"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698567"},{"key":"ref83","article-title":"Invisible mask: Practical attacks on face recognition with infrared","author":"Zhou","year":"2018","journal-title":"arXiv:1803.04683"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2019.00215"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698548"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i09.7085"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3459212.3459217"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/3387940.3391483"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/3467707.3467737"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/3453688.3461751"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/CONIT51480.2021.9498370"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICE54393.2021.00167"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ACAIT53529.2021.9731246"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ICME51207.2021.9428144"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2019.8806124"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2020.2980022"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00407"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/BIOSIG52210.2021.9548291"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON54134.2021.9707433"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON55691.2022.9978132"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3102492"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICDH57206.2022.00031"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/FG52635.2021.9667076"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP42928.2021.9506273"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00386"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/INCET54531.2022.9825044"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3201572"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86890-1_7"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-71852-7_4"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-76346-6_42"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88113-9_21"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-14802-7_57"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58577-8_18"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20233-9_15"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58520-4_11"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-3394-3_28"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11081283"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/3485133"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84522-3_37"},{"key":"ref120","article-title":"What doesn\u2019t kill you makes you Robust(er): How to adversarially train against data poisoning","author":"Geiping","year":"2021","journal-title":"arXiv:2102.13624"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/3538707"},{"key":"ref122","article-title":"Visually adversarial attacks and defenses in the physical world: A survey","author":"Wei","year":"2022","journal-title":"arXiv:2211.01671"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2975654"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3225137"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3319492"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ICUS55513.2022.9986597"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2023.3265363"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11142183"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.3390\/fi15020062"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100270"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.2021.2006781"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.3390\/math11204272"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.2478\/acss-2021-0012"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15883-z"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-10125-w"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-022-02660-6"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-023-10521-4"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-021-00269-9"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-7769-5_15"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-04231-7_8"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-7913-1_12"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9129-7_31"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.10.081"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"ref147","first-page":"1","article-title":"Witches\u2019 brew: Industrial scale data poisoning via gradient matching","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Geiping"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01462"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1145\/3549555.3549588"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2023.3237169"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2022.103895"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.3390\/math11040816"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19954"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.07.157"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2022.125583"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1201\/b15938-311"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.51594\/csitrj.v5i3.909"},{"issue":"1","key":"ref158","first-page":"14","article-title":"The importance of configuration management on complex industrial environments","volume":"7","author":"Larumbe","year":"2020","journal-title":"New Technol."},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207272"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10630524.pdf?arnumber=10630524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T04:04:53Z","timestamp":1725249893000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10630524\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":159,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3439741","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}