{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:27:02Z","timestamp":1756992422538,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,22]],"date-time":"2020-05-22T00:00:00Z","timestamp":1590105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China?","award":["No. 61602241"],"award-info":[{"award-number":["No. 61602241"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,5,22]]},"DOI":"10.1145\/3393527.3393567","type":"proceedings-article","created":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T02:21:28Z","timestamp":1603765288000},"page":"231-235","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Embedding Backdoors as the Facial Features"],"prefix":"10.1145","author":[{"given":"Can","family":"He","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing, China"}]},{"given":"Mingfu","family":"Xue","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing, China"}]},{"given":"Jian","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing, China"}]},{"given":"Weiqiang","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Electronic and Information Engineering Nanjing University of Aeronautics and Astronautics Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2012.6249269"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.08.009"},{"key":"e_1_3_2_1_3_1","first-page":"1","volume-title":"International Joint Conference on Neural Networks","author":"Pagano Christophe","year":"2012","unstructured":"Christophe Pagano , Eric Granger , Robert Sabourin , and Dmitry Gorodnichy . Detector ensembles for face recognition in video surveillance . In International Joint Conference on Neural Networks , pages 1 -- 8 , 2012 . Christophe Pagano, Eric Granger, Robert Sabourin, and Dmitry Gorodnichy. Detector ensembles for face recognition in video surveillance. In International Joint Conference on Neural Networks, pages 1--8, 2012."},{"key":"e_1_3_2_1_4_1","volume-title":"PoTrojan: Powerful neural-level Trojan designs in deep learning models. arXiv:1802.03043","author":"Zou Minhui","year":"2018","unstructured":"Minhui Zou , Yang Shi , Chengliang Wang , Fangyu Li , WenZhan Song , and Yu Wang . PoTrojan: Powerful neural-level Trojan designs in deep learning models. arXiv:1802.03043 , 2018 . Minhui Zou, Yang Shi, Chengliang Wang, Fangyu Li, WenZhan Song, and Yu Wang. PoTrojan: Powerful neural-level Trojan designs in deep learning models. arXiv:1802.03043, 2018."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"e_1_3_2_1_6_1","volume-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv:1708.06733","author":"Gu Tianyu","year":"2017","unstructured":"Tianyu Gu , Brendan Dolan-Gavitt , and Siddharth Garg . Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv:1708.06733 , 2017 . Tianyu Gu, Brendan Dolan-Gavitt, and Siddharth Garg. Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv:1708.06733, 2017."},{"key":"e_1_3_2_1_7_1","volume-title":"Jiahao Yu, Minhui Xue, Dali Kaafar, and Haojin Zhu. Invisible backdoor attacks against deep neural networks. arXiv:1909.02742","author":"Li Shaofeng","year":"2019","unstructured":"Shaofeng Li , Benjamin Zi Hao Zhao , Jiahao Yu, Minhui Xue, Dali Kaafar, and Haojin Zhu. Invisible backdoor attacks against deep neural networks. arXiv:1909.02742 , 2019 . Shaofeng Li, Benjamin Zi Hao Zhao, Jiahao Yu, Minhui Xue, Dali Kaafar, and Haojin Zhu. Invisible backdoor attacks against deep neural networks. arXiv:1909.02742, 2019."},{"key":"e_1_3_2_1_8_1","volume-title":"Targeted backdoor attacks on deep learning systems using data poisoning. arXiv:1712.05526","author":"Chen Xinyun","year":"2017","unstructured":"Xinyun Chen , Chang Liu , Bo Li , Kimberly Lu , and Dawn Song . Targeted backdoor attacks on deep learning systems using data poisoning. arXiv:1712.05526 , 2017 . Xinyun Chen, Chang Liu, Bo Li, Kimberly Lu, and Dawn Song. Targeted backdoor attacks on deep learning systems using data poisoning. arXiv:1712.05526, 2017."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.244"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SISY.2017.8080587"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Insider threats as the main security threat in 2017. https:\/\/www.tripwire.com\/state-of-security\/security-data-protection\/insider-threats-main-security-threat-2017\/.  Insider threats as the main security threat in 2017. https:\/\/www.tripwire.com\/state-of-security\/security-data-protection\/insider-threats-main-security-threat-2017\/.","DOI":"10.1016\/S1361-3723(17)30063-5"},{"key":"e_1_3_2_1_12_1","unstructured":"The insider versus the outsider: Who poses the biggest security risk? https:\/\/www.helpnetsecurity.com\/2015\/08\/19\/the-insider-versus-the-outsider-who-poses-the-biggest-security-risk\/.  The insider versus the outsider: Who poses the biggest security risk? https:\/\/www.helpnetsecurity.com\/2015\/08\/19\/the-insider-versus-the-outsider-who-poses-the-biggest-security-risk\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1577069.1755843"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995566"}],"event":{"name":"ACM TURC'20: ACM Turing Celebration Conference - China","sponsor":["Baidu Research Baidu Research"],"location":"Hefei China","acronym":"ACM TURC'20"},"container-title":["Proceedings of the ACM Turing Celebration Conference - China"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3393527.3393567","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3393527.3393567","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:17Z","timestamp":1750200077000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3393527.3393567"}},"subtitle":["Invisible Backdoor Attacks Against Face Recognition Systems"],"short-title":[],"issued":{"date-parts":[[2020,5,22]]},"references-count":14,"alternative-id":["10.1145\/3393527.3393567","10.1145\/3393527"],"URL":"https:\/\/doi.org\/10.1145\/3393527.3393567","relation":{},"subject":[],"published":{"date-parts":[[2020,5,22]]},"assertion":[{"value":"2020-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}