{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T06:45:37Z","timestamp":1767077137007,"version":"3.48.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1109\/dicta68720.2025.11302421","type":"proceedings-article","created":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T18:36:22Z","timestamp":1767033382000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Investigating Adversarial Robustness Against Preprocessing Used in Blackbox Face Recognition"],"prefix":"10.1109","author":[{"given":"Roland","family":"Croft","sequence":"first","affiliation":[{"name":"Swordfish Computing,Adelaide,Australia"}]},{"given":"Brian","family":"Du","sequence":"additional","affiliation":[{"name":"Swordfish Computing,Adelaide,Australia"}]},{"given":"Darcy","family":"Joseph","sequence":"additional","affiliation":[{"name":"Swordfish Computing,Adelaide,Australia"}]},{"given":"Sharath","family":"Kumar","sequence":"additional","affiliation":[{"name":"Swordfish Computing,Adelaide,Australia"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.3390\/s20020342"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/tbc.2025.3639783"},{"key":"ref3","first-page":"1589","article-title":"Fawkes: Protecting privacy against unauthorized deep learning models","volume-title":"29th USENIX security symposium (USENIX Security 20)","author":"Shan","year":"2020"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/CVPR52733.2024.02321"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/ACCESS.2021.3092646"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/978-3-030-87664-7_7"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/978-3-031-58222-6"},{"key":"ref8","article-title":"Lowkey: Leveraging adversarial attacks to protect social media users from facial recognition","author":"Cherepanova","year":"2021","journal-title":"arXiv preprint arXiv"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ICCV48922.2021.00387"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/CVPR.2019.00284"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/CVPR.2019.00444"},{"key":"ref12","article-title":"Robfr: Benchmarking adversarial robustness on face recognition","author":"Yang","year":"2020","journal-title":"arXiv preprint arXiv"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/CVPR52734.2025.00333"},{"key":"ref14","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv preprint arXiv"},{"key":"ref15","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv preprint arXiv"},{"key":"ref16","article-title":"Transferability in machine learning: from phenomena to black-box attacks using adversarial samples","author":"Papernot","year":"2016","journal-title":"arXiv preprint arXiv"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/3052973.3053009"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1201\/9781351251389-8"},{"key":"ref19","article-title":"Delving into transferable adversarial examples and black-box attacks","author":"Liu","year":"2016","journal-title":"arXiv preprint arXiv"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/CVPR.2018.00957"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ICCV51070.2023.00425"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TCSS.2023.3291565"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/3503161.3548202"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/CVPR46437.2021.01167"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.24963\/ijcai.2021\/173"},{"key":"ref26","first-page":"34136","article-title":"Adv-attribute: Inconspicuous and transferable adversarial attack on face recognition","volume":"35","author":"Jia","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/TIFS.2024.3380848"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1007\/978-981-99-4755-3_43"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/CVPR.2019.00482"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/CVPR.2015.7298682"},{"issue":"2","key":"ref31","doi-asserted-by":"crossref","first-page":"95","DOI":"10.17671\/gazibtd.1399077","article-title":"A benchmark of facial recognition pipelines and co-usability performances of modules","volume":"17","author":"Serengil","year":"2024","journal-title":"Bilisim Teknolojileri Dergisi"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1093\/bioinformatics\/btl242"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/LSP.2016.2603342"},{"issue":"2","key":"ref34","article-title":"Opencv","volume":"3","author":"Bradski","year":"2000","journal-title":"Dr. Dobb\u2019s journal of software tools"},{"key":"ref35","first-page":"1755","article-title":"Dlib-ml: A machine learning toolkit","volume":"10","author":"King","year":"2009","journal-title":"The Journal of Machine Learning Research"},{"key":"ref36","article-title":"Mediapipe: A framework for building perception pipelines","author":"Lugaresi","year":"2019","journal-title":"arXiv preprint arXiv"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/CVPR.2016.91"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1155\/2020\/7845384"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/CVPR42600.2020.00525"},{"key":"ref40","article-title":"Progressive growing of gans for improved quality, stability, and variation","author":"Karras","year":"2017","journal-title":"arXiv preprint arXiv"},{"volume-title":"Face verification on labeled faces in the wild","year":"2025","key":"ref41"},{"volume-title":"Handbook of biological statistics","author":"McDonald","key":"ref42"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/ICCV.2017.74"},{"issue":"7","key":"ref44","first-page":"557","article-title":"Correlation and causation","volume":"20","author":"Wright","year":"1921","journal-title":"Journal of agricultural research"}],"event":{"name":"2025 International Conference on Digital Image Computing: Techniques and Applications (DICTA)","start":{"date-parts":[[2025,12,3]]},"location":"Adelaide, Australia","end":{"date-parts":[[2025,12,5]]}},"container-title":["2025 International Conference on Digital Image Computing: Techniques and Applications (DICTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11302408\/11302416\/11302421.pdf?arnumber=11302421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T06:40:51Z","timestamp":1767076851000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11302421\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/dicta68720.2025.11302421","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]}}}