{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:01:40Z","timestamp":1729623700059,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1109\/mapr53640.2021.9585256","type":"proceedings-article","created":{"date-parts":[[2021,10,29]],"date-time":"2021-10-29T19:28:04Z","timestamp":1635535684000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Physical Transferable Attack against Black-box Face Recognition Systems"],"prefix":"10.1109","author":[{"given":"Dang Minh","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Anh Tien","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Hieu Minh","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Nhan Trong","family":"Le","sequence":"additional","affiliation":[]},{"given":"Tho Thanh","family":"Quan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.1109\/CVPR42600.2020.00643","article-title":"Circle loss: A unified perspective of pair similarity optimization","author":"sun","year":"2020"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00594"},{"article-title":"Resnest: Split-attention networks","year":"2020","author":"zhang","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.683"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00165"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58555-6_8"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01108"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01222"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2018.2822810"},{"article-title":"Mis-classified vector guided softmax loss for face recognition","year":"2019","author":"wang","key":"ref34"},{"key":"ref10","first-page":"5019","article-title":"Adversarially robust generalization requires more data","author":"schmidt","year":"2018","journal-title":"Proceedings of the 32Nd International Conference on Neural Information Processing Systems ser NIPS&#x2019;18"},{"article-title":"Npcface: Negative-positive collaborative training for large-scale face recognition","year":"2021","author":"zeng","key":"ref40"},{"key":"ref11","first-page":"125","article-title":"Adversarial examples are not bugs, they are features","author":"ilyas","year":"2019","journal-title":"Advances in Neural Information Processing Systems 32 Annual Conference on Neural Information Processing Systems 2019 NeurIPS 2019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.244"},{"article-title":"Simple black-box adversarial attacks","year":"2019","author":"guo","key":"ref13"},{"article-title":"Pick-object-attack: Type-specific adversarial attack for object detection","year":"2020","author":"nezami","key":"ref14"},{"article-title":"Adversarial examples in the physical world","year":"2017","author":"kurakin","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00668"},{"article-title":"Skip connections matter: On the transferability of adversarial examples generated with resnets","year":"2020","author":"wu","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.3301962"},{"article-title":"Adversarial examples: Attacks and defenses for deep learning","year":"2018","author":"yuan","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2983686"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2913372"},{"article-title":"Explaining and harnessing adversarial examples","year":"2015","author":"goodfellow","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462205"},{"article-title":"Efficientnet: Rethinking model scaling for convolutional neural networks","year":"2020","author":"tan","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00790"},{"journal-title":"Labeled Faces in the Wild A Database for Studying Face Recognition in Unconstrained Environments","year":"2007","author":"huang","key":"ref8"},{"key":"ref7","first-page":"284","article-title":"Synthesizing robust adversarial examples","volume":"80","author":"athalye","year":"2018","journal-title":"Proceedings of the 35th International Conference on Machine Learning ser Proceedings of Machine Learning Research"},{"article-title":"Intriguing properties of neural networks","year":"2014","author":"szegedy","key":"ref2"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1145\/3474085.3478324","article-title":"Facex-zoo: A pytorh toolbox for face recognition","author":"wang","year":"2021"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"article-title":"Advhat: Real-world adversarial attack on arcface face id system","year":"2019","author":"komkov","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"journal-title":"Labeled Faces in the Wild A Database for Studying Face Recognition in Unconstrained Environments","year":"2007","author":"huang","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46487-9_6"},{"key":"ref41","doi-asserted-by":"crossref","DOI":"10.1109\/CVPR46437.2021.01400","article-title":"Magface: A universal representation for face recognition and quality assessment","author":"meng","year":"2021"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"article-title":"Deep residual learning for image recognition","year":"2015","author":"he","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97909-0_46"}],"event":{"name":"2021 International Conference on Multimedia Analysis and Pattern Recognition (MAPR)","start":{"date-parts":[[2021,10,15]]},"location":"Hanoi, Vietnam","end":{"date-parts":[[2021,10,16]]}},"container-title":["2021 International Conference on Multimedia Analysis and Pattern Recognition (MAPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9585222\/9585196\/09585256.pdf?arnumber=9585256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,11]],"date-time":"2023-11-11T23:35:39Z","timestamp":1699745739000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9585256\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/mapr53640.2021.9585256","relation":{},"subject":[],"published":{"date-parts":[[2021,10]]}}}