{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T14:38:30Z","timestamp":1762353510832,"version":"3.40.1"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62171202"],"award-info":[{"award-number":["62171202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science and Technology Major Project Carried on by Shenzhen","award":["CJGJZD20200617103000001"],"award-info":[{"award-number":["CJGJZD20200617103000001"]}]},{"name":"HKU-SCF FinTech Academy"},{"name":"Shenzhen-Hong Kong-Macao Science and Technology Plan Project","award":["SGDX20210823103537030"],"award-info":[{"award-number":["SGDX20210823103537030"]}]},{"name":"Theme-based Research Scheme of RGC, Hong Kong","award":["T35-710\/20-R"],"award-info":[{"award-number":["T35-710\/20-R"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1109\/tbdata.2024.3403377","type":"journal-article","created":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T17:31:18Z","timestamp":1716226278000},"page":"461-473","source":"Crossref","is-referenced-by-count":1,"title":["Imperceptible Physical Attack Against Face Recognition Systems via LED Illumination Modulation"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0730-8732","authenticated-orcid":false,"given":"Junbin","family":"Fang","sequence":"first","affiliation":[{"name":"Guangdong Provincial Key Laboratory of Optical Fiber Sensing and Communications, Guangdong Provincial Engineering Technology Research Center on Visible Light Communication, Guangzhou Municipal Key Laboratory of Engineering Technology on VisibleLight Communication and the Department of Optoelectronic Engineering, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-8386-6043","authenticated-orcid":false,"given":"Canjian","family":"Jiang","sequence":"additional","affiliation":[{"name":"Guangdong Provincial Key Laboratory of Optical Fiber Sensing and Communications, Guangdong Provincial Engineering Technology Research Center on Visible Light Communication, Guangzhou Municipal Key Laboratory of Engineering Technology on VisibleLight Communication and the Department of Optoelectronic Engineering, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9377-8676","authenticated-orcid":false,"given":"You","family":"Jiang","sequence":"additional","affiliation":[{"name":"Guangdong Provincial Key Laboratory of Optical Fiber Sensing and Communications, Guangdong Provincial Engineering Technology Research Center on Visible Light Communication, Guangzhou Municipal Key Laboratory of Engineering Technology on VisibleLight Communication and the Department of Optoelectronic Engineering, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9466-2643","authenticated-orcid":false,"given":"Puxi","family":"Lin","sequence":"additional","affiliation":[{"name":"Guangdong Provincial Key Laboratory of Optical Fiber Sensing and Communications, Guangdong Provincial Engineering Technology Research Center on Visible Light Communication, Guangzhou Municipal Key Laboratory of Engineering Technology on VisibleLight Communication and the Department of Optoelectronic Engineering, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6784-457X","authenticated-orcid":false,"given":"Zhaojie","family":"Chen","sequence":"additional","affiliation":[{"name":"Guangdong Provincial Key Laboratory of Optical Fiber Sensing and Communications, Guangdong Provincial Engineering Technology Research Center on Visible Light Communication, Guangzhou Municipal Key Laboratory of Engineering Technology on VisibleLight Communication and the Department of Optoelectronic Engineering, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0819-296X","authenticated-orcid":false,"given":"Yujing","family":"Sun","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3975-8500","authenticated-orcid":false,"given":"Siu-Ming","family":"Yiu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8944-7444","authenticated-orcid":false,"given":"Zoe L.","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, Shenzhen, Guangdong, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/s20020342"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.06.019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1364\/AO.57.002087"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.41"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46478-7_31"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v29i1.9797"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3092646"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1177\/2041669519863077"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5220\/0006798105550566"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123761"},{"article-title":"Intriguing properties of neural networks","year":"2013","author":"Szegedy","key":"ref12"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"Goodfellow","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5220\/0006131100390050"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0173319"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09604-z"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2019.00215"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00415"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3317611"},{"article-title":"Invisible mask: Practical attacks on face recognition with infrared","year":"2018","author":"Zhou","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3102492"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"article-title":"Facial landmarks with dlib, OpenCV, and Python","year":"2017","author":"Rosebrock","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00525"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-71852-7_4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00790"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02359"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109009"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3351261"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02366"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2019.8901711"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1097\/00006324-199108000-00012"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.596"},{"key":"ref36","first-page":"1","article-title":"Labeled faces in the wild: A database forstudying face recognition in unconstrained environments","volume-title":"Proc. Workshop Faces \u2018Real-Life\u2019 Images: Detection Alignment Recognit.","author":"Huang"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/78.678493"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00153"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687317\/10925345\/10535230.pdf?arnumber=10535230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T21:19:07Z","timestamp":1742246347000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10535230\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":38,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2024.3403377","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"type":"electronic","value":"2332-7790"},{"type":"electronic","value":"2372-2096"}],"subject":[],"published":{"date-parts":[[2025,4]]}}}