{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:34:17Z","timestamp":1775745257839,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978392","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"1528-1540","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1037,"title":["Accessorize to a Crime"],"prefix":"10.1145","author":[{"given":"Mahmood","family":"Sharif","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Sruti","family":"Bhagavatula","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Lujo","family":"Bauer","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Michael K.","family":"Reiter","sequence":"additional","affiliation":[{"name":"University of North Carolina, Chapel Hill, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.598228"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01197708"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-2604-3_16"},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. USENIX Security","author":"Carlini N.","year":"2016","unstructured":"N. Carlini , P. Mishra , T. Vaidya , Y. Zhang , M. Sherr , C. Shields , D. Wagner , and W. Zhou . Hidden voice commands . In Proc. USENIX Security , 2016 . N. Carlini, P. Mishra, T. Vaidya, Y. Zhang, M. Sherr, C. Shields, D. Wagner, and W. Zhou. Hidden voice commands. In Proc. USENIX Security, 2016."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MHS.1995.494215"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712688"},{"key":"e_1_3_2_1_8_1","volume-title":"Learning deep face representation. arXiv preprint arXiv:1403.2802","author":"Fan H.","year":"2014","unstructured":"H. Fan , Z. Cao , Y. Jiang , Q. Yin , and C. Doudou . Learning deep face representation. arXiv preprint arXiv:1403.2802 , 2014 . H. Fan, Z. Cao, Y. Jiang, Q. Yin, and C. Doudou. Learning deep face representation. arXiv preprint arXiv:1403.2802, 2014."},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. ICML, Workshop on Deep Learning","author":"Fawzi A.","year":"2015","unstructured":"A. Fawzi , O. Fawzi , and P. Frossard . Fundamental limits on adversarial robustness . In Proc. ICML, Workshop on Deep Learning , 2015 . A. Fawzi, O. Fawzi, and P. Frossard. Fundamental limits on adversarial robustness. In Proc. ICML, Workshop on Deep Learning, 2015."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2502081.2502121"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.08.022"},{"key":"e_1_3_2_1_13_1","volume-title":"ICLR","author":"Goodfellow I. J.","year":"2015","unstructured":"I. J. Goodfellow , J. Shlens , and C. Szegedy . Explaining and harnessing adversarial examples . In ICLR , 2015 . I. J. Goodfellow, J. Shlens, and C. Szegedy. Explaining and harnessing adversarial examples. In ICLR, 2015."},{"key":"e_1_3_2_1_14_1","volume-title":"CV Dazzle: Camouflage from face detection. Master's thesis","author":"Harvey A.","year":"2010","unstructured":"A. Harvey . CV Dazzle: Camouflage from face detection. Master's thesis , New York University , 2010 . Available at: http:\/\/cvdazzle.com. A. Harvey. CV Dazzle: Camouflage from face detection. Master's thesis, New York University, 2010. Available at: http:\/\/cvdazzle.com."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2514\/6.2005-1897"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"e_1_3_2_1_18_1","volume-title":"Facial recognition technology: A survey of policy and implementation issues","author":"Introna L.","year":"2010","unstructured":"L. Introna and H. Nissenbaum . Facial recognition technology: A survey of policy and implementation issues . 2010 . https:\/\/goo.gl\/eIrldb. L. Introna and H. Nissenbaum. Facial recognition technology: A survey of policy and implementation issues. 2010. https:\/\/goo.gl\/eIrldb."},{"key":"e_1_3_2_1_19_1","unstructured":"Itseez. OpenCV: Open Source Computer Vision. http:\/\/opencv.org\/.  Itseez. OpenCV: Open Source Computer Vision. http:\/\/opencv.org\/."},{"key":"e_1_3_2_1_20_1","unstructured":"N. Koren. Color management and color science. http:\/\/www.normankoren.com\/color_management.html.  N. Koren. Color management and color science. http:\/\/www.normankoren.com\/color_management.html."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459250"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590315"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883060"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299155"},{"key":"e_1_3_2_1_25_1","unstructured":"Megvii Inc. Face  Megvii Inc. Face"},{"key":"e_1_3_2_1_26_1","unstructured":". http:\/\/www.faceplusplus.com\/.  . http:\/\/www.faceplusplus.com\/."},{"key":"e_1_3_2_1_27_1","unstructured":"MobileSec. Mobilesec Android Authentication Framework. https:\/\/github.com\/mobilesec\/authentication-framework-module-face.  MobileSec. Mobilesec Android Authentication Framework. https:\/\/github.com\/mobilesec\/authentication-framework-module-face."},{"key":"e_1_3_2_1_28_1","unstructured":"NEC. Face recognition. http:\/\/www.nec.com\/en\/global\/solutions\/biometrics\/technologies\/face_recognition.html.  NEC. Face recognition. http:\/\/www.nec.com\/en\/global\/solutions\/biometrics\/technologies\/face_recognition.html."},{"key":"e_1_3_2_1_29_1","unstructured":"NEURO Technology. SentiVeillance SDK. http:\/\/www.neurotechnology.com\/sentiveillance.html.  NEURO Technology. SentiVeillance SDK. http:\/\/www.neurotechnology.com\/sentiveillance.html."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1980-0572855-7"},{"key":"e_1_3_2_1_31_1","unstructured":"OpenALPR. OpenALPR - Automatic License Plate Recognition. http:\/\/www.openalpr.com\/.  OpenALPR. OpenALPR - Automatic License Plate Recognition. http:\/\/www.openalpr.com\/."},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. IEEE Euro S&P","author":"Papernot N.","year":"2015","unstructured":"N. Papernot , P. McDaniel , S. Jha , M. Fredrikson , Z. B. Celik , and A. Swami . The limitations of deep learning in adversarial settings . In Proc. IEEE Euro S&P , 2015 . N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z. B. Celik, and A. Swami. The limitations of deep learning in adversarial settings. In Proc. IEEE Euro S&P, 2015."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.41"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-012-9951-y"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.20"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2906831.2906851"},{"key":"e_1_3_2_1_38_1","volume-title":"DTIC Document","author":"Rumelhart D. E.","year":"1985","unstructured":"D. E. Rumelhart , G. E. Hinton , and R. J. Williams . Learning internal representations by error propagation. Technical report , DTIC Document , 1985 . D. E. Rumelhart, G. E. Hinton, and R. J. Williams. Learning internal representations by error propagation. Technical report, DTIC Document, 1985."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_3_2_1_40_1","volume-title":"Proc. ICLR","author":"Szegedy C.","year":"2014","unstructured":"C. Szegedy , W. Zaremba , I. Sutskever , J. Bruna , D. Erhan , I. J. Goodfellow , and R. Fergus . Intriguing properties of neural networks . In Proc. ICLR , 2014 . C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. J. Goodfellow, and R. Fergus. Intriguing properties of neural networks. In Proc. ICLR, 2014."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.1991.3.1.71"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2807412"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2001.990517"},{"key":"e_1_3_2_1_44_1","volume-title":"Proc.\\ CEAS","author":"Wittel G. L.","year":"2004","unstructured":"G. L. Wittel and S. F. Wu . On attacking statistical spam filters . In Proc.\\ CEAS , 2004 . G. L. Wittel and S. F. Wu. On attacking statistical spam filters. In Proc.\\ CEAS, 2004."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2013.271"},{"key":"e_1_3_2_1_46_1","volume-title":"Proc. NIPS","author":"Yosinski J.","year":"2014","unstructured":"J. Yosinski , J. Clune , Y. Bengio , and H. Lipson . How transferable are features in deep neural networks ? In Proc. NIPS , 2014 . J. Yosinski, J. Clune, Y. Bengio, and H. Lipson. How transferable are features in deep neural networks? In Proc. NIPS, 2014."},{"key":"e_1_3_2_1_47_1","volume-title":"Naive-deep face recognition: Touching the limit of LFW benchmark or not? arXiv preprint arXiv:1501.04690","author":"Zhou E.","year":"2015","unstructured":"E. Zhou , Z. Cao , and Q. Yin . Naive-deep face recognition: Touching the limit of LFW benchmark or not? arXiv preprint arXiv:1501.04690 , 2015 . E. Zhou, Z. Cao, and Q. Yin. Naive-deep face recognition: Touching the limit of LFW benchmark or not? arXiv preprint arXiv:1501.04690, 2015."}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978392","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:15Z","timestamp":1750218015000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978392"}},"subtitle":["Real and Stealthy Attacks on State-of-the-Art Face Recognition"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":45,"alternative-id":["10.1145\/2976749.2978392","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978392","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}