{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T15:22:17Z","timestamp":1778080937892,"version":"3.51.4"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,1,10]],"date-time":"2021-01-10T00:00:00Z","timestamp":1610236800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,10]],"date-time":"2021-01-10T00:00:00Z","timestamp":1610236800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,10]],"date-time":"2021-01-10T00:00:00Z","timestamp":1610236800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,10]]},"DOI":"10.1109\/icpr48806.2021.9412236","type":"proceedings-article","created":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T22:15:54Z","timestamp":1620252954000},"page":"819-826","source":"Crossref","is-referenced-by-count":203,"title":["AdvHat: Real-World Adversarial Attack on ArcFace Face ID System"],"prefix":"10.1109","author":[{"given":"Stepan","family":"Komkov","sequence":"first","affiliation":[]},{"given":"Aleksandr","family":"Petiushko","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"yi","year":"2014","journal-title":"Learning face representation from scratch"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.153"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref32","author":"szegedy","year":"2013","journal-title":"Intriguing properties of neural networks"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref30","article-title":"Physical adversarial examples for object detectors","author":"song","year":"0","journal-title":"12th USENIX Workshop on Offensive Technologies (WOOT 18)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00552"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2018.2822810"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298891"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8238"},{"key":"ref40","author":"zhao","year":"2018","journal-title":"Seeing isn't Believing Practical Adversarial Attack Against Object Detectors"},{"key":"ref11","first-page":"87","article-title":"Ms-celeb-1m: A dataset and benchmark for large-scale face recognition","author":"guo","year":"0","journal-title":"European Conference on Computer Vision"},{"key":"ref12","first-page":"2017","article-title":"Spatial transformer networks","author":"jaderberg","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.527"},{"key":"ref14","author":"kurakin","year":"2016","journal-title":"Adversarial examples in the physical world"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.713"},{"key":"ref16","first-page":"7","article-title":"Large-margin softmax loss for convolutional neural networks","volume":"2","author":"liu","year":"2016","journal-title":"ICML"},{"key":"ref17","author":"lu","year":"2017","journal-title":"Adversarial Examples that Fool Detectors"},{"key":"ref18","author":"madry","year":"2017","journal-title":"Towards deep learning models resistant to adversarial attacks"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00700"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3317611"},{"key":"ref3","first-page":"4","volume":"2","author":"chen","year":"2018","journal-title":"Robust physical adversarial attack on faster r-CNN object detector"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.884093"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref8","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref2","author":"brown","year":"2017","journal-title":"Adversarial Patch"},{"key":"ref9","author":"goodfellow","year":"2014","journal-title":"Explaining and Harnessing Adversarial Examples"},{"key":"ref1","first-page":"284","article-title":"Synthesizing robust adversarial examples","author":"athalye","year":"0","journal-title":"International Conference on Machine Learning"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.690"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref24","first-page":"91","article-title":"Faster r-cnn: Towards real-time object detection with region proposal networks","author":"ren","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref23","author":"redmon","year":"2018","journal-title":"YOLOv3 An Incremental Improvement"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"}],"event":{"name":"2020 25th International Conference on Pattern Recognition (ICPR)","location":"Milan, Italy","start":{"date-parts":[[2021,1,10]]},"end":{"date-parts":[[2021,1,15]]}},"container-title":["2020 25th International Conference on Pattern Recognition (ICPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9411940\/9411911\/09412236.pdf?arnumber=9412236","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:40:45Z","timestamp":1652182845000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9412236\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,10]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/icpr48806.2021.9412236","relation":{},"subject":[],"published":{"date-parts":[[2021,1,10]]}}}