{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:41:37Z","timestamp":1765438897074,"version":"3.28.0"},"reference-count":61,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179429","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"917-933","source":"Crossref","is-referenced-by-count":10,"title":["DepthFake: Spoofing 3D Face Authentication with a 2D Photo"],"prefix":"10.1109","author":[{"given":"Zhihao","family":"Wu","sequence":"first","affiliation":[{"name":"Zhejiang University,Ubiquitous System Security Lab (USSLAB)"}]},{"given":"Yushi","family":"Cheng","sequence":"additional","affiliation":[{"name":"Tsinghua University,Beijing National Research Center for Information Science and Technology (BNRist)"}]},{"given":"Jiahui","family":"Yang","sequence":"additional","affiliation":[{"name":"Zhejiang University,Ubiquitous System Security Lab (USSLAB)"}]},{"given":"Xiaoyu","family":"Ji","sequence":"additional","affiliation":[{"name":"Zhejiang University,Ubiquitous System Security Lab (USSLAB)"}]},{"given":"Wenyuan","family":"Xu","sequence":"additional","affiliation":[{"name":"Zhejiang University,Ubiquitous System Security Lab (USSLAB)"}]}],"member":"263","reference":[{"volume-title":"31st USENIX Security Symposium (USENIX Security 22)","key":"ref1","article-title":"DoubleStar: Long-Range attack towards depth estimation based obstacle avoidance in autonomous systems"},{"key":"ref2","article-title":"3divi face recognition platform. [EB\/OL]"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117503"},{"key":"ref5","article-title":"About face id advanced technology"},{"volume-title":"Baidu ai cloud face recognition platform","key":"ref6"},{"volume-title":"Customer cases of baidu face authentication application kit","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698550"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2630740"},{"key":"ref11","article-title":"The OpenCV Library","author":"Bradski","year":"2000","journal-title":"Dr. Dobb\u2019s Journal of Software Tools"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-4765(18)30010-9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339815"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117509"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5121\/ijit.2014.3202"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR49039.2020.00048"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1117\/12.2253264"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SVR51698.2020.00046"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37410-4_11"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00790"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ijcb52358.2021.9484333"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00779"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2343913"},{"key":"ref25","first-page":"2484","article-title":"Simple black-box adversarial attacks","volume-title":"International Conference on Machine Learning","author":"Guo"},{"article-title":"Meaningful adversarial stickers for face recognition in physical world","year":"2021","author":"Guo","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SSIAI.2010.5483908"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-010-0360-8"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71629-7_50"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref31","first-page":"1755","article-title":"Dlib-ml: A machine learning toolkit","volume":"10","author":"King","year":"2009","journal-title":"Journal of Machine Learning Research"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412236"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00095"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8546026"},{"article-title":"Characterizing adversarial subspaces using local intrinsic dimensionality","year":"2018","author":"Ma","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6524-8"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712688"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00415"},{"article-title":"Deep k-nearest neighbors: Towards confident, interpretable and robust deep learning","year":"2018","author":"Papernot","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578288"},{"key":"ref42","article-title":"3d camera market size, share, development, growth and demand forecast to 2022 \u2013 industry insights by technology (time of flight, stereo vision and structured light imaging), by type (free camera and target camera), and by application (professional cameras, smartphone, tablets, computer and other)"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2395951"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3351261"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW54805.2022.00036"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2018.04.013"},{"key":"ref50","first-page":"877","article-title":"Towards robust lidar-based perception in autonomous driving: General black-box adversarial sensor attack and countermeasures","volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20)","author":"Sun"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICME46284.2020.9102720"},{"key":"ref52","article-title":"Tencent cloud face recognition platform"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01373"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICCI51257.2020.9247836"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3176760"},{"article-title":"Learn convolutional neural network for face anti-spoofing","year":"2014","author":"Yang","key":"ref56"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/amm.401-403.180"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3036801"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.23"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-26409-2_19"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2023,5,21]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179429.pdf?arnumber=10179429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:14:46Z","timestamp":1721452486000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179429\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179429","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}