{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:13:29Z","timestamp":1753600409279},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,4]]},"DOI":"10.1109\/ijcb52358.2021.9484380","type":"proceedings-article","created":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T20:34:10Z","timestamp":1626813250000},"page":"1-7","source":"Crossref","is-referenced-by-count":8,"title":["Universal Adversarial Spoofing Attacks against Face Recognition"],"prefix":"10.1109","author":[{"given":"Takuma","family":"Amada","sequence":"first","affiliation":[]},{"given":"Seng Pei","family":"Liew","sequence":"additional","affiliation":[]},{"given":"Kazuya","family":"Kakizaki","sequence":"additional","affiliation":[]},{"given":"Toshinori","family":"Araki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref11","article-title":"Labeled faces in the wild: A database for studying face recognition in unconstrained environments","author":"huang","year":"2007","journal-title":"Technical Report 07-49"},{"key":"ref12","article-title":"Adversarial machine learning at scale","author":"kurakin","year":"2017","journal-title":"5th International Conference on Learning Representations ICLR 2017 Toulon France April 24-26 2017 Conference Track Proceedings"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.713"},{"key":"ref14","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2018","journal-title":"6th International conference on Learning Representations ICLR 2018 Vancouver BC Canada April 30 - May 3 2018 Conference Track Proceedings"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2430"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref17","first-page":"1","article-title":"Generating master faces for use in performing wolf attacks on face recognition systems","author":"nguyen","year":"2020","journal-title":"2020 IEEE International Joint Conference on Biometrics IJCB 2020 Houston TX USA September 28 - October 1 2020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.41"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272695"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00552"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_42"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00790"},{"key":"ref29","article-title":"Learning face representation from scratch","author":"yi","year":"2014","journal-title":"CoRR"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref8","article-title":"Toward open-set face recognition","author":"g\u00fcnther","year":"2017","journal-title":"CoRR"},{"key":"ref7","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"3rd International Conference on Learning Representations ICLR 2015 San Diego CA USA May 7-9 2015 Conference Track Proceedings"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698539"},{"key":"ref9","first-page":"87","article-title":"Ms-celeb-1m: A dataset and benchmark for large-scale face recognition","author":"guo","year":"2016","journal-title":"Computer Vision - ECCV 2016 - 14th European Conference Amsterdam The Netherlands October 11-14 2016 Proceedings Part III volume 9907 of Lecture Notes in Computer Science"},{"key":"ref1","article-title":"Multiple-identity image attacks against face-based identity verification","author":"andrews","year":"2019","journal-title":"CoRR"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref22","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2015","journal-title":"3rd International Conference on Learning Representations ICLR 2015 San Diego CA USA May 7-9 2015 Conference Track Proceedings"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref24","first-page":"1988","article-title":"Deep learning face representation by joint identification-verification","author":"sun","year":"2014","journal-title":"NIPS"},{"key":"ref23","article-title":"Attacks on state-of-the-art face recognition using attentional adversarial attack generative network","author":"song","year":"2018","journal-title":"CoRR"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref25","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"2nd International Conference on Learning Representations ICLR 2014 Banff AB Canada April 14-16 2014 Conference Track Proceedings"}],"event":{"name":"2021 IEEE International Joint Conference on Biometrics (IJCB)","start":{"date-parts":[[2021,8,4]]},"location":"Shenzhen, China","end":{"date-parts":[[2021,8,7]]}},"container-title":["2021 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9484326\/9484328\/09484380.pdf?arnumber=9484380","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:48:12Z","timestamp":1652197692000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9484380\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,4]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/ijcb52358.2021.9484380","relation":{},"subject":[],"published":{"date-parts":[[2021,8,4]]}}}