{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:12Z","timestamp":1750220592739,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Swiss National Science Foundation","award":["PZ00P2_186090"],"award-info":[{"award-number":["PZ00P2_186090"]}]},{"name":"European Union?s Internal Security Fund","award":["815356"],"award-info":[{"award-number":["815356"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,28]]},"DOI":"10.1145\/3399715.3399826","type":"proceedings-article","created":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T23:52:29Z","timestamp":1601682749000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Counterterrorism for Cyber-Physical Spaces"],"prefix":"10.1145","author":[{"given":"Giuseppe","family":"Cascavilla","sequence":"first","affiliation":[{"name":"Eindhoven University of Technology, Den Bosch, Netherlands"}]},{"given":"Johann","family":"Slabber","sequence":"additional","affiliation":[{"name":"Tilburg University Den Bosch, Netherlands"}]},{"given":"Fabio","family":"Palomba","sequence":"additional","affiliation":[{"name":"SeSa Lab - University of Salerno Salerno, Italy"}]},{"given":"Dario","family":"Di Nucci","sequence":"additional","affiliation":[{"name":"Tilburg University Den Bosch, Netherlands"}]},{"given":"Damian A.","family":"Tamburri","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, Den Bosch, Netherlands"}]},{"given":"Willem-Jan","family":"van den Heuvel","sequence":"additional","affiliation":[{"name":"Tilburg University Den Bosch, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2020,10,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Rameen Abdal Yipeng Qin and Peter Wonka. 2019. Image2StyleGAN: How to Embed Images Into the StyleGAN Latent Space? arXiv: cs.CV\/1904.03189  Rameen Abdal Yipeng Qin and Peter Wonka. 2019. Image2StyleGAN: How to Embed Images Into the StyleGAN Latent Space? arXiv: cs.CV\/1904.03189","DOI":"10.1109\/ICCV.2019.00453"},{"key":"e_1_3_2_1_2_1","unstructured":"David Bau Jun-Yan Zhu Hendrik Strobelt Bolei Zhou Joshua B. Tenenbaum William T. Freeman and Antonio Torralba. 2018. GAN Dissection: Visualizing and Understanding Generative Adversarial Networks. arXiv:cs.CV\/1811.10597  David Bau Jun-Yan Zhu Hendrik Strobelt Bolei Zhou Joshua B. Tenenbaum William T. Freeman and Antonio Torralba. 2018. GAN Dissection: Visualizing and Understanding Generative Adversarial Networks. arXiv:cs.CV\/1811.10597"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.2011.00258.x"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2009.200"},{"key":"e_1_3_2_1_5_1","unstructured":"Andrew Brock Jeff Donahue and Karen Simonyan. 2018. Large Scale GAN Training for High Fidelity Natural Image Synthesis. arXiv:cs.LG\/1809.11096  Andrew Brock Jeff Donahue and Karen Simonyan. 2018. Large Scale GAN Training for High Fidelity Natural Image Synthesis. arXiv:cs.LG\/1809.11096"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2010.01492.x"},{"volume-title":"Simulating social phenomena","author":"Conte Rosaria","key":"e_1_3_2_1_7_1","unstructured":"Rosaria Conte , Rainer Hegselmann , and Pietro Terna . 2013. Simulating social phenomena . Vol. 456 . Springer Science & Business Media . Rosaria Conte, Rainer Hegselmann, and Pietro Terna. 2013. Simulating social phenomena. Vol. 456. Springer Science & Business Media."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2013.09.001"},{"key":"e_1_3_2_1_9_1","volume-title":"Adversarial feature learning. arXiv preprint arXiv:1605.09782","author":"Donahue Jeff","year":"2016","unstructured":"Jeff Donahue , Philipp Kr\u00e4henb\u00fchl , and Trevor Darrell . 2016. Adversarial feature learning. arXiv preprint arXiv:1605.09782 ( 2016 ). Jeff Donahue, Philipp Kr\u00e4henb\u00fchl, and Trevor Darrell. 2016. Adversarial feature learning. arXiv preprint arXiv:1605.09782 (2016)."},{"key":"e_1_3_2_1_10_1","volume-title":"Adversarially learned inference. arXiv preprint arXiv:1606.00704","author":"Dumoulin Vincent","year":"2016","unstructured":"Vincent Dumoulin , Ishmael Belghazi , Ben Poole , Olivier Mastropietro , Alex Lamb , Martin Arjovsky , and Aaron Courville . 2016. Adversarially learned inference. arXiv preprint arXiv:1606.00704 ( 2016 ). Vincent Dumoulin, Ishmael Belghazi, Ben Poole, Olivier Mastropietro, Alex Lamb, Martin Arjovsky, and Aaron Courville. 2016. Adversarially learned inference. arXiv preprint arXiv:1606.00704 (2016)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2010.01401.x"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(82)90023-2"},{"key":"e_1_3_2_1_13_1","volume-title":"Style Generator Inversion for Image Enhancement and Animation. arXiv preprint arXiv:1906.11880","author":"Gabbay Aviv","year":"2019","unstructured":"Aviv Gabbay and Yedid Hoshen . 2019. Style Generator Inversion for Image Enhancement and Animation. arXiv preprint arXiv:1906.11880 ( 2019 ). Aviv Gabbay and Yedid Hoshen. 2019. Style Generator Inversion for Image Enhancement and Animation. arXiv preprint arXiv:1906.11880 (2019)."},{"key":"e_1_3_2_1_14_1","volume-title":"A Neural Algorithm of Artistic Style. CoRR abs\/1508.06576","author":"Gatys Leon A.","year":"2015","unstructured":"Leon A. Gatys , Alexander S. Ecker , and Matthias Bethge . 2015. A Neural Algorithm of Artistic Style. CoRR abs\/1508.06576 ( 2015 ). http:\/\/arxiv.org\/abs\/1508.06576 Leon A. Gatys, Alexander S. Ecker, and Matthias Bethge. 2015. A Neural Algorithm of Artistic Style. CoRR abs\/1508.06576 (2015). http:\/\/arxiv.org\/abs\/1508.06576"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.265"},{"volume-title":"Advances in Neural Information Processing Systems 27","author":"Goodfellow Ian","key":"e_1_3_2_1_16_1","unstructured":"Ian Goodfellow , Jean Pouget-Abadie , Mehdi Mirza , Bing Xu , David Warde-Farley , Sherjil Ozair , Aaron Courville , and Yoshua Bengio . 2014. Generative Adversarial Nets . In Advances in Neural Information Processing Systems 27 , Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger (Eds.). Curran Associates, Inc. , 2672--2680. http:\/\/papers.nips.cc\/paper\/5423-generative-adversarial-nets.pdf Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative Adversarial Nets. In Advances in Neural Information Processing Systems 27, Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger (Eds.). Curran Associates, Inc., 2672--2680. http:\/\/papers.nips.cc\/paper\/5423-generative-adversarial-nets.pdf"},{"key":"e_1_3_2_1_17_1","unstructured":"Ian J. Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative Adversarial Networks. http:\/\/arxiv.org\/abs\/1406.2661 cite arxiv:1406.2661.  Ian J. Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative Adversarial Networks. http:\/\/arxiv.org\/abs\/1406.2661 cite arxiv:1406.2661."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.377"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi8030133"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Isaias Hoyos Bruno Esposito and Miguel N\u00fa\u00f1ez del Prado. 2018. DETECTOR: Automatic Detection System for Terrorist Attack Trajectories.. In SIMBig (Communications in Computer and Information Science) Juan Antonio Lossio-Ventura Denisse Mu\u00f1ante and Hugo Alatrista-Salas (Eds.) Vol. 898. Springer 160--173.  Isaias Hoyos Bruno Esposito and Miguel N\u00fa\u00f1ez del Prado. 2018. DETECTOR: Automatic Detection System for Terrorist Attack Trajectories.. In SIMBig (Communications in Computer and Information Science) Juan Antonio Lossio-Ventura Denisse Mu\u00f1ante and Hugo Alatrista-Salas (Eds.) Vol. 898. Springer 160--173.","DOI":"10.1007\/978-3-030-11680-4_17"},{"key":"e_1_3_2_1_21_1","volume-title":"DeepMVS: Learning Multi-View Stereopsis. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Huang Po-Han","year":"2018","unstructured":"Po-Han Huang , Kevin Matzen , Johannes Kopf , Narendra Ahuja , and Jia-Bin Huang . 2018 . DeepMVS: Learning Multi-View Stereopsis. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Po-Han Huang, Kevin Matzen, Johannes Kopf, Narendra Ahuja, and Jia-Bin Huang. 2018. DeepMVS: Learning Multi-View Stereopsis. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"e_1_3_2_1_23_1","volume-title":"Analyzing and Improving the Image Quality of StyleGAN. CoRR abs\/1912.04958","author":"Karras Tero","year":"2019","unstructured":"Tero Karras , Samuli Laine , Miika Aittala , Janne Hellsten , Jaakko Lehtinen , and Timo Aila . 2019. Analyzing and Improving the Image Quality of StyleGAN. CoRR abs\/1912.04958 ( 2019 ). Tero Karras, Samuli Laine, Miika Aittala, Janne Hellsten, Jaakko Lehtinen, and Timo Aila. 2019. Analyzing and Improving the Image Quality of StyleGAN. CoRR abs\/1912.04958 (2019)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1111\/rssa.12323"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70096-0_22"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.59"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1304060.1304517"},{"key":"e_1_3_2_1_28_1","unstructured":"Shital Shah Debadeepta Dey Chris Lovett and Ashish Kapoor. 2017. AirSim: High-Fidelity Visual and Physical Simulation for Autonomous Vehicles. In Field and Service Robotics. arXiv:arXiv:1705.05065 https:\/\/arxiv.org\/abs\/1705.05065  Shital Shah Debadeepta Dey Chris Lovett and Ashish Kapoor. 2017. AirSim: High-Fidelity Visual and Physical Simulation for Autonomous Vehicles. In Field and Service Robotics. arXiv:arXiv:1705.05065 https:\/\/arxiv.org\/abs\/1705.05065"},{"key":"e_1_3_2_1_29_1","volume-title":"Interpreting the latent space of gans for semantic face editing. arXiv preprint arXiv:1907.10786","author":"Shen Yujun","year":"2019","unstructured":"Yujun Shen , Jinjin Gu , Xiaoou Tang , and Bolei Zhou . 2019. Interpreting the latent space of gans for semantic face editing. arXiv preprint arXiv:1907.10786 ( 2019 ). Yujun Shen, Jinjin Gu, Xiaoou Tang, and Bolei Zhou. 2019. Interpreting the latent space of gans for semantic face editing. arXiv preprint arXiv:1907.10786 (2019)."},{"volume-title":"Data-driven country safety monitoring terrorist attack prediction","author":"Spiliotopoulos Dimitris","key":"e_1_3_2_1_30_1","unstructured":"Dimitris Spiliotopoulos , Costas Vassilakis , and Dionisis Margaris . 2019. Data-driven country safety monitoring terrorist attack prediction .. In ASONAM, Francesca Spezzano, Wei Chen, and Xiaokui Xiao (Eds.). ACM , 1128--1135. Dimitris Spiliotopoulos, Costas Vassilakis, and Dionisis Margaris. 2019. Data-driven country safety monitoring terrorist attack prediction.. In ASONAM, Francesca Spezzano, Wei Chen, and Xiaokui Xiao (Eds.). ACM, 1128--1135."},{"key":"e_1_3_2_1_31_1","unstructured":"Kayo Yin. 2019. How to Train StyleGAN to Generate Realistic Faces. https:\/\/bit.ly\/2FQ0CU7.  Kayo Yin. 2019. How to Train StyleGAN to Generate Realistic Faces. https:\/\/bit.ly\/2FQ0CU7."}],"event":{"name":"AVI '20: International Conference on Advanced Visual Interfaces","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","ACM Association for Computing Machinery","SIGMM ACM Special Interest Group on Multimedia","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Salerno Italy","acronym":"AVI '20"},"container-title":["Proceedings of the International Conference on Advanced Visual Interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3399715.3399826","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3399715.3399826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:48Z","timestamp":1750195908000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3399715.3399826"}},"subtitle":["A Computer Vision Approach"],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":31,"alternative-id":["10.1145\/3399715.3399826","10.1145\/3399715"],"URL":"https:\/\/doi.org\/10.1145\/3399715.3399826","relation":{},"subject":[],"published":{"date-parts":[[2020,9,28]]},"assertion":[{"value":"2020-10-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}