{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:19:54Z","timestamp":1767183594771,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1109\/biosig55365.2022.9896963","type":"proceedings-article","created":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T15:57:01Z","timestamp":1664294221000},"page":"1-5","source":"Crossref","is-referenced-by-count":6,"title":["Model-Free Template Reconstruction Attack with Feature Converter"],"prefix":"10.1109","author":[{"given":"Muku","family":"Akasaka","sequence":"first","affiliation":[{"name":"Shizuoka University,Shizuoka,Japan"}]},{"given":"Soshi","family":"Maeda","sequence":"additional","affiliation":[{"name":"Shizuoka University,Shizuoka,Japan"}]},{"given":"Yuya","family":"Sato","sequence":"additional","affiliation":[{"name":"Shizuoka University,Shizuoka,Japan"}]},{"given":"Masakatsu","family":"Nishigaki","sequence":"additional","affiliation":[{"name":"Shizuoka University,Shizuoka,Japan"}]},{"given":"Tetsushi","family":"Ohki","sequence":"additional","affiliation":[{"name":"Shizuoka University,Shizuoka,Japan"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"ref11","first-page":"214","article-title":"Wasserstein generative adversarial networks","author":"arjovsky","year":"2017","journal-title":"Proceedings of the 34th International Conference on Machine Learning"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref13","article-title":"Learning face representation from scratch","author":"yi","year":"2014","journal-title":"arXiv preprint arXiv 1411 7923"},{"key":"ref14","article-title":"Learning to align from scratch","author":"huang","year":"2012","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00033"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.41"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref19","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2015","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00617"},{"key":"ref3","first-page":"1188","volume":"41","author":"mai","year":"2019","journal-title":"Face image reconstruction from deep templates"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2003.1226104"},{"journal-title":"Biometric System Security","year":"2002","author":"soutar","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BIOSIG52210.2021.9548290"},{"key":"ref7","article-title":"Inverting face embeddings with convolutional neural networks","author":"zhmoginov","year":"2016","journal-title":"arXiv preprint arXiv 1606 04189"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2004.1345057"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"622","DOI":"10.1117\/12.530907","article-title":"Attacks on biometric systems: a case study in fingerprints","volume":"5306","author":"uludag","year":"2004","journal-title":"Security Steganography and Watermarking of Multimedia Contents VI"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref20","article-title":"Improved techniques for training GANs","volume":"29","author":"salimans","year":"2016","journal-title":"Advances in Neural Information Processing Systems (NIPS)"}],"event":{"name":"2022 International Conference of the Biometrics Special Interest Group (BIOSIG)","start":{"date-parts":[[2022,9,14]]},"location":"Darmstadt, Germany","end":{"date-parts":[[2022,9,16]]}},"container-title":["2022 International Conference of the Biometrics Special Interest Group (BIOSIG)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9896866\/9896958\/09896963.pdf?arnumber=9896963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T16:54:19Z","timestamp":1665766459000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9896963\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/biosig55365.2022.9896963","relation":{},"subject":[],"published":{"date-parts":[[2022,9]]}}}