{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:03:31Z","timestamp":1750309411167,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T00:00:00Z","timestamp":1698364800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,27]]},"DOI":"10.1145\/3650215.3650259","type":"proceedings-article","created":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T22:11:20Z","timestamp":1713305480000},"page":"251-255","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Frequency-based Adversarial Privacy Protection Strategy Against Face Recognition Neural NetworksFrequency-based Adversarial Privacy Protection Strategy"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-6905-6651","authenticated-orcid":false,"given":"Wei","family":"Zheng","sequence":"first","affiliation":[{"name":"China Academy of Information and Communications Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3073-717X","authenticated-orcid":false,"given":"Han","family":"Hai","sequence":"additional","affiliation":[{"name":"China Academy of Information and Communications Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4171-4480","authenticated-orcid":false,"given":"Fandi","family":"Zhou","sequence":"additional","affiliation":[{"name":"China Academy of Information and Communications Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Intriguing properties of neural networks [J]. arXiv preprint arXiv:1312.6199","author":"Szegedy C","year":"2013","unstructured":"Szegedy C, Zaremba W, Sutskever I, Intriguing properties of neural networks [J]. arXiv preprint arXiv:1312.6199, 2013."},{"key":"e_1_3_2_1_2_1","volume-title":"Explaining and harnessing adversarial examples [J]. arXiv preprint arXiv:1412.6572","author":"Goodfellow I J","year":"2014","unstructured":"Goodfellow I J, Shlens J, Szegedy C. Explaining and harnessing adversarial examples [J]. arXiv preprint arXiv:1412.6572, 2014."},{"key":"e_1_3_2_1_3_1","volume-title":"Towards deep learning models resistant to adversarial attacks [J]. arXiv preprint arXiv:1706.06083","author":"Madry A","year":"2017","unstructured":"Madry A, Makelov A, Schmidt L, Towards deep learning models resistant to adversarial attacks [J]. arXiv preprint arXiv:1706.06083, 2017."},{"key":"e_1_3_2_1_4_1","volume-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models [J]. arXiv preprint arXiv:1712.04248","author":"Brendel W","year":"2017","unstructured":"Brendel W, Rauber J, Bethge M. Decision-based adversarial attacks: Reliable attacks against black-box machine learning models [J]. arXiv preprint arXiv:1712.04248, 2017."},{"key":"e_1_3_2_1_5_1","volume-title":"Sharma Y","author":"Chen P Y","year":"2017","unstructured":"Chen P Y, Zhang H, Sharma Y, Zoo: Zeroth order optimization based black-box attacks to deep neural networks without training substitute models[C]\/\/Proceedings of the 10th ACM workshop on artificial intelligence and security. 2017, 15-26."},{"key":"e_1_3_2_1_6_1","volume-title":"Sign-opt: A query-efficient hard-label adversarial attack [J]. arXiv preprint arXiv:1909.10773","author":"Cheng M","year":"2019","unstructured":"Cheng M, Singh S, Chen P, Sign-opt: A query-efficient hard-label adversarial attack [J]. arXiv preprint arXiv:1909.10773, 2019."},{"key":"e_1_3_2_1_7_1","volume-title":"Square attack: a query-efficient black-box adversarial attack via random search[C]\/\/European conference on computer vision","author":"Andriushchenko M","year":"2020","unstructured":"Andriushchenko M, Croce F, Flammarion N, Square attack: a query-efficient black-box adversarial attack via random search[C]\/\/European conference on computer vision. Cham: Springer International Publishing, 2020, 484-501."},{"key":"e_1_3_2_1_8_1","first-page":"641","volume":"2020","author":"Li M","unstructured":"Li M, Deng C, Li T, Towards transferable targeted attack[C]\/\/Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2020, 641-649.","journal-title":"Pattern Recognition."},{"key":"e_1_3_2_1_9_1","first-page":"940","volume":"2020","author":"Lu Y","unstructured":"Lu Y, Jia Y, Wang J, Enhancing cross-task black-box transferability of adversarial examples with dispersion reduction[C]\/\/Proceedings of the IEEE\/CVF conference on Computer Vision and Pattern Recognition. 2020, 940-949.","journal-title":"Pattern Recognition."},{"key":"e_1_3_2_1_10_1","first-page":"1161","volume":"2020","author":"Wu W","unstructured":"Wu W, Su Y, Chen X, Boosting the transferability of adversarial samples via attention[C]\/\/Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2020, 1161-1170.","journal-title":"Pattern Recognition."},{"key":"e_1_3_2_1_11_1","volume-title":"Transferability in machine learning: from phenomena to black-box attacks using adversarial samples [J]. arXiv preprint arXiv:1605.07277","author":"Papernot N","year":"2016","unstructured":"Papernot N, McDaniel P, Goodfellow I. Transferability in machine learning: from phenomena to black-box attacks using adversarial samples [J]. arXiv preprint arXiv:1605.07277, 2016."},{"key":"e_1_3_2_1_12_1","volume-title":"Practical black-box attacks against machine learning[C]\/\/Proceedings of the 2017 ACM on Asia conference on computer and communications security","author":"Papernot N","year":"2017","unstructured":"Papernot N, McDaniel P, Goodfellow I, Practical black-box attacks against machine learning[C]\/\/Proceedings of the 2017 ACM on Asia conference on computer and communications security. 2017, 506-519."},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"IEEE","author":"Bose A J","year":"2018","unstructured":"Bose A J, Aarabi P. Adversarial attacks on face detectors using neural net based constrained optimization[C]\/\/2018 IEEE 20th International Workshop on Multimedia Signal Processing (MMSP). IEEE, 2018, 1-6."},{"key":"e_1_3_2_1_14_1","volume-title":"Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition[C]\/\/Proceedings of the 2016 acm sigsac conference on computer and communications security","author":"Sharif M","year":"2016","unstructured":"Sharif M, Bhagavatula S, Bauer L, Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition[C]\/\/Proceedings of the 2016 acm sigsac conference on computer and communications security. 2016, 1528-1540."},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"ACM Transactions on Privacy and Security (TOPS)","author":"Sharif M","year":"2019","unstructured":"Sharif M, Bhagavatula S, Bauer L, A general framework for adversarial examples with objectives [J]. ACM Transactions on Privacy and Security (TOPS), 2019, 22(3): 1-30."},{"key":"e_1_3_2_1_16_1","first-page":"7714","volume":"2019","author":"Dong Y","unstructured":"Dong Y, Su H, Wu B, Efficient decision-based black-box adversarial attacks on face recognition[C]\/\/Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2019, 7714-7722.","journal-title":"Pattern Recognition."},{"key":"e_1_3_2_1_17_1","volume-title":"Attacks on state-of-the-art face recognition using attentional adversarial attack generative network[J]. Multimedia tools and applications","author":"Yang L","year":"2021","unstructured":"Yang L, Song Q, Wu Y. Attacks on state-of-the-art face recognition using attentional adversarial attack generative network[J]. Multimedia tools and applications, 2021, 80: 855-875."},{"key":"e_1_3_2_1_18_1","first-page":"2516","volume":"2019","author":"Zhu Z A","unstructured":"Zhu Z A, Lu Y Z, Chiang C K. Generating adversarial examples by makeup attacks on face recognition[C]\/\/2019 IEEE International Conference on Image Processing (ICIP). IEEE, 2019: 2516-2520.","journal-title":"IEEE"},{"key":"e_1_3_2_1_19_1","volume-title":"Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition","author":"Mahmood Sharif","year":"2016","unstructured":"Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, and Michael K Reiter. Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. 2016."},{"key":"e_1_3_2_1_20_1","volume-title":"Advhat: Real-world adversarial attack on arcface face id system","author":"Stepan Komkov","year":"2019","unstructured":"Stepan Komkov and Aleksandr Petiushko. Advhat: Real-world adversarial attack on arcface face id system. 2019."},{"key":"e_1_3_2_1_21_1","volume-title":"Workshop on faces in \u2018Real-Life\u2019 Images: detection, alignment, and recognition","author":"Gary B","year":"2008","unstructured":"Gary B Huang, Marwan Mattar, Tamara Berg, and Eric Learned-Miller. Labeled faces in the wild: A database forstudying face recognition in unconstrained environments. In Workshop on faces in \u2018Real-Life\u2019 Images: detection, alignment, and recognition, 2008."},{"key":"e_1_3_2_1_22_1","first-page":"4410","volume-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","author":"Tero Karras","year":"2019","unstructured":"Tero Karras, Samuli Laine, and Timo Aila. A style-based generator architecture for generative adversarial networks. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pages 4401\u20134410, 2019."},{"key":"e_1_3_2_1_23_1","first-page":"4699","volume-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","author":"Jiankang Deng","year":"2019","unstructured":"Jiankang Deng, Jia Guo, Niannan Xue, and Stefanos Zafeiriou. Arcface: Additive angular margin loss for deep face recognition. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pages 4690\u20134699, 2019."},{"key":"e_1_3_2_1_24_1","volume-title":"Adv-makeup: A new imperceptible and transferable attack on face recognition. arXiv preprint arXiv:2105.03162","author":"Bangjie Yin","year":"2021","unstructured":"Bangjie Yin, Wenxuan Wang, Taiping Yao, Junfeng Guo, Zelun Kong, Shouhong Ding, Jilin Li, and Cong Liu. Adv-makeup: A new imperceptible and transferable attack on face recognition. arXiv preprint arXiv:2105.03162, 2021."},{"key":"e_1_3_2_1_25_1","first-page":"10490","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","author":"Qiao Gu","year":"2019","unstructured":"Qiao Gu, Guanzhi Wang, Mang Tik Chiu, YuWing Tai, and Chi-Keung Tang. Ladn: Local adversarial disentangling network for facial makeup and de-makeup. In Proceedings of the IEEE\/CVF International Conference on Computer Vision, pages 10481\u201310490, 2019."},{"key":"e_1_3_2_1_26_1","first-page":"826","volume-title":"2020 25th International Conference on Pattern Recognition (ICPR)","author":"Stepan Komkov","unstructured":"Stepan Komkov and Aleksandr Petiushko. Advhat: Real-world adversarial attack on arcface face id system. In 2020 25th International Conference on Pattern Recognition (ICPR), pages 819\u2013826. IEEE, 2021."},{"key":"e_1_3_2_1_27_1","first-page":"1540","volume-title":"Proceedings of the 2016 acm sigsac conference on computer and communications security","author":"Mahmood Sharif","year":"2016","unstructured":"Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, and Michael K Reiter. Accessorize to a crime: Real and stealthy attacks on state-of-theart face recognition. In Proceedings of the 2016 acm sigsac conference on computer and communications security, pages 1528\u20131540, 2016."},{"key":"e_1_3_2_1_28_1","volume-title":"Adversarial patch. arXiv preprint arXiv:1712.09665","author":"Tom B","year":"2017","unstructured":"Tom B Brown, Dandelion Man\u00b4e, Aurko Roy, Mart\u00b4\u0131n Abadi, and Justin Gilmer. Adversarial patch. arXiv preprint arXiv:1712.09665, 2017."}],"event":{"name":"ICMLCA 2023: 2023 4th International Conference on Machine Learning and Computer Application","acronym":"ICMLCA 2023","location":"Hangzhou China"},"container-title":["2023 4th International Conference on Machine Learning and Computer Application"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650215.3650259","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650215.3650259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:10Z","timestamp":1750294690000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650215.3650259"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,27]]},"references-count":28,"alternative-id":["10.1145\/3650215.3650259","10.1145\/3650215"],"URL":"https:\/\/doi.org\/10.1145\/3650215.3650259","relation":{},"subject":[],"published":{"date-parts":[[2023,10,27]]},"assertion":[{"value":"2024-04-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}