{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:50:20Z","timestamp":1775580620648,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100012025","name":"New York University Abu Dhabi Global Ph.D. Fellowship Program","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012025","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012025","name":"New York University Abu Dhabi Center for Cyber Security","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012025","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Biom. Behav. Identity Sci."],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1109\/tbiom.2021.3132132","type":"journal-article","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T20:24:52Z","timestamp":1638476692000},"page":"361-372","source":"Crossref","is-referenced-by-count":17,"title":["FaceHack: Attacking Facial Recognition Systems Using Malicious Facial Characteristics"],"prefix":"10.1109","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4473-7368","authenticated-orcid":false,"given":"Esha","family":"Sarkar","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, New York University Tandon School of Engineering, Brooklyn, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5511-3182","authenticated-orcid":false,"given":"Hadjer","family":"Benkraouda","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3646-2920","authenticated-orcid":false,"given":"Gopika","family":"Krishnan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, New York University Abu Dhabi, Abu Dhabi, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3256-783X","authenticated-orcid":false,"given":"Homer","family":"Gamil","sequence":"additional","affiliation":[{"name":"Department of Computer Science, New York University Tandon School of Engineering, Brooklyn, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6899-0651","authenticated-orcid":false,"given":"Michail","family":"Maniatakos","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Use These Biometrics to Pass Through UAE Airports","author":"Hilotin","year":"2019"},{"key":"ref2","volume-title":"Transforming Immigration and Border Crossing in Colombia With Automated Border Control","author":"Tinjaca","year":"2019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326028"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2930479"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00032"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.10.081"},{"key":"ref7","volume-title":"Why Biometrics Are the Foundation for the Airport of the Future","author":"Vall\u00e9e","year":"2019"},{"key":"ref8","volume-title":"The Border Guards You Can\u2019T Win Over With a Smile","author":"Kendrick","year":"2019"},{"key":"ref9","article-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain","volume-title":"arXiv:1708.06733","author":"Gu","year":"2017"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3114024"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2020.2968275"},{"key":"ref12","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","volume-title":"arXiv:1712.05526","author":"Chen","year":"2017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref14","article-title":"Detecting backdoor attacks on deep neural networks by activation clustering","volume-title":"arXiv:1811.03728","author":"Chen","year":"2018"},{"key":"ref15","first-page":"8000","article-title":"Spectral signatures in backdoor attacks","volume-title":"Proc. 31st Adv. Neural Inf. Process. Syst.","author":"Tran"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363216"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00614"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3393527.3393567"},{"key":"ref20","volume-title":"FaceApp","year":"2021"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2502081.2502121"},{"key":"ref24","first-page":"175","article-title":"Bypassing backdoor detection algorithms in deep learning","volume-title":"Proc. IEEE Eur. Symp. Secur. Privacy (EuroS&P)","author":"Juin"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB48548.2020.9304875"},{"key":"ref26","article-title":"Backdoor embedding in convolutional neural network models via invisible perturbation","volume-title":"arXiv:1808.10307","author":"Liao","year":"2018"},{"key":"ref27","article-title":"Dynamic backdoor attacks against machine learning models","volume-title":"arXiv:2003.03675","author":"Salem","year":"2020"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6871"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SPW50608.2020.00024"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354209"},{"key":"ref31","article-title":"Blind backdoors in deep learning models","volume-title":"arXiv:2005.03823","author":"Bagdasaryan","year":"2020"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"ref33","article-title":"NNoculation: Broad spectrum and targeted treatment of backdoored dnns","volume-title":"arXiv:2002.08313","author":"Veldanda","year":"2020"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359790"},{"key":"ref35","first-page":"443","article-title":"Seeing is not believing: Camouflage attacks on image scaling algorithms","volume-title":"Proc. 28th USENIX Secur. Symp. (USENIX Secur.)","author":"Xiao"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SPW50608.2020.00025"},{"key":"ref37","article-title":"Robust anomaly detection and backdoor attack detection via differential privacy","volume-title":"arXiv:1911.07116","author":"Du","year":"2019"},{"key":"ref38","article-title":"On the effectiveness of mitigating data poisoning attacks with gradient shaping","volume-title":"arXiv:2002.11497","author":"Hong","year":"2020"},{"key":"ref39","first-page":"1541","article-title":"Demon in the variant: Statistical analysis of dnns for robust backdoor contamination detection","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Security 21)","author":"Tang"},{"key":"ref40","first-page":"17044","article-title":"Identifying mislabeled data using the area under the margin ranking","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Pleiss"},{"key":"ref41","first-page":"5739","article-title":"Learning with bad training data via iterative trimmed loss minimization","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","volume":"97","author":"Shen"},{"key":"ref42","volume-title":"Trojans in artificial intelligence (trojai)","author":"King","year":"2019"},{"key":"ref43","volume-title":"Everyone from Drake to the Jonas Brothers is posting photos where they look old\u2013These are the best ones","author":"Gilbert","year":"2019"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref45","article-title":"Explainability matters: Backdoor attacks on medical imaging","volume-title":"arXiv:2101.00008","author":"Nwadike","year":"2020"}],"container-title":["IEEE Transactions on Biometrics, Behavior, and Identity Science"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8423754\/9833477\/09632692.pdf?arnumber=9632692","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T02:05:41Z","timestamp":1710381941000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9632692\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":45,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tbiom.2021.3132132","relation":{},"ISSN":["2637-6407"],"issn-type":[{"value":"2637-6407","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7]]}}}