{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T06:03:04Z","timestamp":1759384984067,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1109\/fg52635.2021.9666972","type":"proceedings-article","created":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T00:34:23Z","timestamp":1643157263000},"page":"01-05","source":"Crossref","is-referenced-by-count":7,"title":["Adversarially Perturbed Wavelet-based Morphed Face Generation"],"prefix":"10.1109","author":[{"given":"Kelsey","family":"O'Haire","sequence":"first","affiliation":[]},{"given":"Sobhan","family":"Soleymani","sequence":"additional","affiliation":[]},{"given":"Baaria","family":"Chaudhary","sequence":"additional","affiliation":[]},{"given":"Poorya","family":"Aghdaie","sequence":"additional","affiliation":[]},{"given":"Jeremy","family":"Dawson","sequence":"additional","affiliation":[]},{"given":"Nasser M.","family":"Nasrabadi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Facemorpher","year":"2019","author":"quek","key":"ref10"},{"journal-title":"Face morph using opencv - c++ \/ python","year":"2016","author":"mallick","key":"ref11"},{"journal-title":"debruine\/webmorph Beta release 2","year":"2018","author":"debruine","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP42928.2021.9506775"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00339"},{"key":"ref16","article-title":"Inception-v4, inception-resnet and the impact of residual connections on learning","author":"szegedy","year":"0","journal-title":"Thirty-First AAAI Conference on Artificial Intelligence"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68780-9_44"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996240"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00158"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF50991.2021.9465074"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0173319"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref7","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"0","journal-title":"ArXiv Preprint"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489113"},{"key":"ref9","article-title":"Vulnerability Analysis of Face Morphing Attacks from Landmarks and Generative Adversarial Networks","author":"sarkar","year":"2020","journal-title":"ArXiv Preprint"},{"journal-title":"9303-Machine Readable Travel Documents Part 9 Deployment of Biometric Identification and Electronic Storage of Data in eMRTDs","article-title":"ICAO","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299155"},{"journal-title":"Face research lab london set","year":"2017","author":"debruine","key":"ref22"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/S0262-8856(97)00070-X","article-title":"The feret database and evaluation procedure for face-recognition algorithems","volume":"16","author":"jonathon phillips","year":"1998","journal-title":"Image and Vision Computing"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2017.0147"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.268"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2994750"}],"event":{"name":"2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021)","start":{"date-parts":[[2021,12,15]]},"location":"Jodhpur, India","end":{"date-parts":[[2021,12,18]]}},"container-title":["2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9666787\/9666788\/09666972.pdf?arnumber=9666972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:55:29Z","timestamp":1652187329000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9666972\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/fg52635.2021.9666972","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]}}}