{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:50:56Z","timestamp":1775580656610,"version":"3.50.1"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,28]]},"DOI":"10.1109\/ijcb48548.2020.9304898","type":"proceedings-article","created":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T16:58:35Z","timestamp":1610038715000},"page":"1-10","source":"Crossref","is-referenced-by-count":98,"title":["AdvFaces: Adversarial Face Synthesis"],"prefix":"10.1109","author":[{"given":"Debayan","family":"Deb","sequence":"first","affiliation":[]},{"given":"Jianbang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Anil K.","family":"Jain","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"2018","journal-title":"On a Typical Day in Fiscal Year 2018"},{"key":"ref38","first-page":"4","article-title":"Texture networks: Feed-forward synthesis of textures and stylized images","volume":"1","author":"ulyanov","year":"2016","journal-title":"ICML"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref31","first-page":"2234","article-title":"Improved techniques for training gans","author":"salimans","year":"2016","journal-title":"NIPS"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272695"},{"key":"ref37","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"ArXiv Preprint"},{"key":"ref36","first-page":"8312","article-title":"Constructing unrestricted adversarial examples with generative models","author":"song","year":"2018","journal-title":"NIPS"},{"key":"ref35","article-title":"Attacks on state-of-the-art face recognition using attentional adversarial attack generative network","author":"song","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3317611"},{"key":"ref10","article-title":"Robust physical-world attacks on deep learning models","author":"eykholt","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref40","article-title":"AT-GAN: A Generative Attack Model for Adversarial Transferring on Generative Adversarial Nets","author":"xiaosen","year":"0","journal-title":"ArXiv Preprint"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.265"},{"key":"ref12","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"NIPS"},{"key":"ref13","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"ArXiv Preprint"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v32i1.12341","article-title":"Unravelling robustness of deep learning based face recognition against adversarial attacks","author":"goswami","year":"2018","journal-title":"AAAI"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8238"},{"key":"ref16","first-page":"106","article-title":"Report on the evaluation of 2d still-image face recognition algorithms","volume":"7709","author":"grother","year":"2010","journal-title":"NIST interagency report"},{"key":"ref17","article-title":"Labeled faces in the wild: A database for studying face recognition in unconstrained environments","author":"huang","year":"2007","journal-title":"University of Massachusetts Amherst"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref19","first-page":"694","article-title":"Perceptual losses for real-time style transfer and super-resolution","author":"johnson","year":"2016","journal-title":"ECCV"},{"key":"ref28","article-title":"Unsupervised representation learning with deep convolutional generative adversarial networks","author":"radford","year":"2015","journal-title":"ArXiv Preprint"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref3","first-page":"1","article-title":"Adversarial attacks on face detectors using neural net based constrained optimization","author":"joey bose","year":"2018","journal-title":"IEEE MMSP"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2019.00215"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref7","first-page":"1486","article-title":"Deep generative image models using a laplacian pyramid of adversarial networks","author":"denton","year":"2015","journal-title":"NIPS"},{"key":"ref2","article-title":"Adversarial transformation networks: Learning to generate adversarial examples","author":"baluja","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref1","year":"0","journal-title":"U S Customs and Border Protection"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00790"},{"key":"ref20","article-title":"Adversarial machine learning at scale","author":"kurakin","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref22","article-title":"Delving into transferable adversarial examples and black-box attacks","author":"liu","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.713"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/543"},{"key":"ref24","first-page":"5040","article-title":"Disentangling factors of variation in deep representation using adversarial training","author":"mathieu","year":"2016","journal-title":"NIPS"},{"key":"ref41","year":"2019"},{"key":"ref23","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref44","article-title":"Learning face representation from scratch","author":"yi","year":"2014","journal-title":"ArXiv Preprint"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.29007\/6bnf","article-title":"Spatially transformed adversarial examples","author":"xiao","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"}],"event":{"name":"2020 IEEE International Joint Conference on Biometrics (IJCB)","location":"Houston, TX, USA","start":{"date-parts":[[2020,9,28]]},"end":{"date-parts":[[2020,10,1]]}},"container-title":["2020 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9304574\/9304852\/09304898.pdf?arnumber=9304898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,10]],"date-time":"2022-12-10T22:38:59Z","timestamp":1670711939000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9304898\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/ijcb48548.2020.9304898","relation":{},"subject":[],"published":{"date-parts":[[2020,9,28]]}}}