{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:15:00Z","timestamp":1771467300374,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1145\/3658664.3659630","type":"proceedings-article","created":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T15:09:27Z","timestamp":1718204967000},"page":"165-174","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["AdvOcl: Naturalistic Clothing Pattern Adversarial to Person Detectors in Occlusion"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-5279-0029","authenticated-orcid":false,"given":"Zhitong","family":"Lu","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China &amp; School of Cyber Security, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2160-8344","authenticated-orcid":false,"given":"Duohe","family":"Ma","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2269-1175","authenticated-orcid":false,"given":"Linna","family":"Fan","sequence":"additional","affiliation":[{"name":"College of Information and Communication, National University of Defense Technology, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8579-5544","authenticated-orcid":false,"given":"Zhen","family":"Xu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2184-4280","authenticated-orcid":false,"given":"Kai","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6,24]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3127960"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020--10103--4"},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\"a ssan","author":"Athalye Anish","year":"2018","unstructured":"Anish Athalye, Logan Engstrom, Andrew Ilyas, and Kevin Kwok. 2018. Synthesizing Robust Adversarial Examples. In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\"a ssan, Stockholm, Sweden, July 10--15, 2018 (Proceedings of Machine Learning Research, Vol. 80), Jennifer G. Dy and Andreas Krause (Eds.). PMLR, 284--293. http:\/\/proceedings.mlr.press\/v80\/athalye18b.html"},{"key":"e_1_3_2_2_4_1","volume-title":"YOLOv4: Optimal Speed and Accuracy of Object Detection. CoRR","author":"Bochkovskiy Alexey","year":"2020","unstructured":"Alexey Bochkovskiy, Chien-Yao Wang, and Hong-Yuan Mark Liao. 2020. YOLOv4: Optimal Speed and Accuracy of Object Detection. CoRR , Vol. abs\/2004.10934 (2020). showeprint[arXiv]2004.10934 https:\/\/arxiv.org\/abs\/2004.10934"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.24792"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2929257"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.31.6.063046"},{"key":"e_1_3_2_2_8_1","volume-title":"VITON-HD: High-Resolution Virtual Try-On via Misalignment-Aware Normalization. CoRR","author":"Choi Seunghwan","year":"2021","unstructured":"Seunghwan Choi, Sunghyun Park, Minsoo Lee, and Jaegul Choo. 2021. VITON-HD: High-Resolution Virtual Try-On via Misalignment-Aware Normalization. CoRR , Vol. abs\/2103.16874 (2021). showeprint[arXiv]2103.16874 https:\/\/arxiv.org\/abs\/2103.16874"},{"key":"e_1_3_2_2_9_1","unstructured":"Dance Color. 2023. dancecolor home page. https:\/\/www.dancecolor.net\/."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2022.3152367"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.2991\/icetis-14.2014.21"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2205.15463"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.715"},{"key":"e_1_3_2_2_15_1","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Y. Bengio. 2014. Generative Adversarial Nets. In Neural Information Processing Systems."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.01057"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00787"},{"key":"e_1_3_2_2_18_1","volume-title":"Piotr Doll\u00e1 r, and Ross B. Girshick","author":"He Kaiming","year":"2017","unstructured":"Kaiming He, Georgia Gkioxari, Piotr Doll\u00e1 r, and Ross B. Girshick. 2017. Mask R-CNN. CoRR , Vol. abs\/1703.06870 (2017). showeprint[arXiv]1703.06870 http:\/\/arxiv.org\/abs\/1703.06870"},{"key":"e_1_3_2_2_19_1","volume-title":"Denoising Diffusion Probabilistic Models. In Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020","author":"Ho Jonathan","year":"2020","unstructured":"Jonathan Ho, Ajay Jain, and Pieter Abbeel. 2020. Denoising Diffusion Probabilistic Models. In Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, December 6--12, 2020, virtual, Hugo Larochelle, Marc'Aurelio Ranzato, Raia Hadsell, Maria-Florina Balcan, and Hsuan-Tien Lin (Eds.). https:\/\/proceedings.neurips.cc\/paper\/2020\/hash\/4c5bcfec8584af0d967f1ab10179ca4b-Abstract.html"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00775"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01628"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01295"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","unstructured":"Glenn Jocher Ayush Chaurasia Alex Stoken Jirka Borovec NanoCode012 Yonghye Kwon Kalen Michael TaoXie Jiacong Fang imyhxy Lorna Zeng Yifu Colin Wong Abhiram V Diego Montes Zhiqiang Wang Cristi Fati Jebastin Nadar Laughing UnglvKitDe Victor Sonck tkianai yxNONG Piotr Skalski Adam Hogan Dhruv Nair Max Strobel and Mrinal Jain. 2022. ultralytics\/yolov5: v7.0 - YOLOv5 SOTA Realtime Instance Segmentation. https:\/\/doi.org\/10.5281\/zenodo.7347926","DOI":"10.5281\/zenodo.7347926"},{"key":"e_1_3_2_2_24_1","volume-title":"Adam: A Method for Stochastic Optimization. Computer Science","author":"Kingma Diederik","year":"2014","unstructured":"Diederik Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimization. Computer Science (2014)."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412236"},{"key":"e_1_3_2_2_26_1","unstructured":"Alex Krizhevsky. 2009. Learning multiple layers of features from tiny images. Technical Report."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00191"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"e_1_3_2_2_29_1","volume-title":"Arbitrary Virtual Try-On Network: Characteristics Preservation and Trade-off between Body and Clothing. CoRR","author":"Liu Yu","year":"2021","unstructured":"Yu Liu, Mingbo Zhao, Zhao Zhang, Haijun Zhang, and Shuicheng Yan. 2021. Arbitrary Virtual Try-On Network: Characteristics Preservation and Trade-off between Body and Clothing. CoRR , Vol. abs\/2111.12346 (2021). showeprint[arXiv]2111.12346 https:\/\/arxiv.org\/abs\/2111.12346"},{"key":"e_1_3_2_2_30_1","volume-title":"Adversarial Examples that Fool Detectors. CoRR","author":"Lu Jiajun","year":"2017","unstructured":"Jiajun Lu, Hussein Sibai, and Evan Fabry. 2017. Adversarial Examples that Fool Detectors. CoRR , Vol. abs\/1712.02494 (2017). showeprint[arXiv]1712.02494 http:\/\/arxiv.org\/abs\/1712.02494"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1706.06083"},{"key":"e_1_3_2_2_32_1","volume-title":"MagNet: a Two-Pronged Defense against Adversarial Examples. CoRR","author":"Meng Dongyu","year":"2017","unstructured":"Dongyu Meng and Hao Chen. 2017. MagNet: a Two-Pronged Defense against Adversarial Examples. CoRR , Vol. abs\/1705.09064 (2017). showeprint[arXiv]1705.09064 http:\/\/arxiv.org\/abs\/1705.09064"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"Ben Mildenhall Pratul P. Srinivasan Matthew Tancik Jonathan T. Barron Ravi Ramamoorthi and Ren Ng. 2020. NeRF: Representing Scenes as Neural Radiance Fields for View Synthesis.","DOI":"10.1007\/978-3-030-58452-8_24"},{"key":"e_1_3_2_2_34_1","volume-title":"Heejune Ahn, Paul L. Rosin, and Yu-Kun Lai.","author":"Minar Matiur Rahman","year":"2020","unstructured":"Matiur Rahman Minar, Thai Thanh Tuan, Heejune Ahn, Paul L. Rosin, and Yu-Kun Lai. 2020. CP-VTON: Clothing Shape and Texture Preserving Image-Based Virtual Try-On. https:\/\/api.semanticscholar.org\/CorpusID:228164027"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-020-01242-z"},{"key":"e_1_3_2_2_36_1","volume-title":"Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks. CoRR","author":"Ren Shaoqing","year":"2015","unstructured":"Shaoqing Ren, Kaiming He, Ross B. Girshick, and Jian Sun. 2015. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks. CoRR , Vol. abs\/1506.01497 (2015). showeprint[arXiv]1506.01497 http:\/\/arxiv.org\/abs\/1506.01497"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature24270"},{"key":"e_1_3_2_2_39_1","volume-title":"D2C: Diffusion-Denoising Models for Few-shot Conditional Generation. CoRR","author":"Sinha Abhishek","year":"2021","unstructured":"Abhishek Sinha, Jiaming Song, Chenlin Meng, and Stefano Ermon. 2021. D2C: Diffusion-Denoising Models for Few-shot Conditional Generation. CoRR , Vol. abs\/2106.06819 (2021). showeprint[arXiv]2106.06819 https:\/\/arxiv.org\/abs\/2106.06819"},{"key":"e_1_3_2_2_40_1","volume-title":"2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, April 14--16, 2014, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.). http:\/\/arxiv.org\/abs\/1312","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian J. Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In 2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, April 14--16, 2014, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.). http:\/\/arxiv.org\/abs\/1312.6199"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475653"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030-01261--8_36"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00721"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20141"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2209.14262"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00846"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3167509"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2209.15179"},{"key":"e_1_3_2_2_50_1","volume-title":"Computer Vision -- ECCV","author":"Xu Kaidi","year":"2020","unstructured":"Kaidi Xu, Gaoyuan Zhang, Sijia Liu, Quanfu Fan, Mengshu Sun, Hongge Chen, Pin-Yu Chen, Yanzhi Wang, and Xue Lin. 2020. Adversarial T-Shirt! Evading Person Detectors in a Physical World. In Computer Vision -- ECCV 2020, Andrea Vedaldi, Horst Bischof, Thomas Brox, and Jan-Michael Frahm (Eds.). Springer International Publishing, Cham, 665--681."},{"key":"e_1_3_2_2_51_1","volume-title":"Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks. (04","author":"Xu Weilin","year":"2017","unstructured":"Weilin Xu, David Evans, and Yanjun Qi. 2017. Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks. (04 2017)."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00787"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.01061"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2211.03264"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i4.16477"}],"event":{"name":"IH&MMSEC '24: ACM Workshop on Information Hiding and Multimedia Security","location":"Baiona Spain","acronym":"IH&MMSEC '24","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658664.3659630","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658664.3659630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T23:43:42Z","timestamp":1755906222000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658664.3659630"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":55,"alternative-id":["10.1145\/3658664.3659630","10.1145\/3658664"],"URL":"https:\/\/doi.org\/10.1145\/3658664.3659630","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]},"assertion":[{"value":"2024-06-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}