{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T04:07:56Z","timestamp":1768536476831,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2232023Y-01"],"award-info":[{"award-number":["2232023Y-01"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100007219","name":"Natural Science Foundation of Shanghai","doi-asserted-by":"publisher","award":["22ZR1400200"],"award-info":[{"award-number":["22ZR1400200"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1145\/3664647.3680840","type":"proceedings-article","created":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T06:59:27Z","timestamp":1729925967000},"page":"4043-4052","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Fooling 3D Face Recognition with One Single 2D Image"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9526-0303","authenticated-orcid":false,"given":"Shizong","family":"Yan","sequence":"first","affiliation":[{"name":"Donghua University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6682-8927","authenticated-orcid":false,"given":"Huixiang","family":"Wen","sequence":"additional","affiliation":[{"name":"Donghua University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5253-2549","authenticated-orcid":false,"given":"Shan","family":"Chang","sequence":"additional","affiliation":[{"name":"Donghua University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8657-5064","authenticated-orcid":false,"given":"Hongzi","family":"Zhu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0455-8086","authenticated-orcid":false,"given":"Luo","family":"Zhou","sequence":"additional","affiliation":[{"name":"Donghua University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apple. 2024. About face id advanced technology. https:\/\/support.apple.com\/en-us\/HT208108."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 34th International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"223","author":"Arjovsky Martin","year":"2017","unstructured":"Martin Arjovsky, Soumith Chintala, and L\u00e9on Bottou. 2017. Wasserstein Generative Adversarial Networks. In Proceedings of the 34th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 70),, Doina Precup and Yee Whye Teh (Eds.). PMLR, 214--223. https:\/\/proceedings.mlr.press\/v70\/arjovsky17a.html"},{"key":"e_1_3_2_1_3_1","unstructured":"Baidu. 2024. Baidu ai cloud face recognition platform. https:\/\/intl.cloud.baidu.com\/product\/face. html."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/311535.311556"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.583"},{"key":"e_1_3_2_1_6_1","volume-title":"Signature verification using a\" siamese\" time delay neural network. Advances in neural information processing systems","author":"Bromley Jane","year":"1993","unstructured":"Jane Bromley, Isabelle Guyon, Yann LeCun, Eduard S\u00e4ckinger, and Roopak Shah. 1993. Signature verification using a\" siamese\" time delay neural network. Advances in neural information processing systems, Vol. 6 (1993)."},{"key":"e_1_3_2_1_7_1","unstructured":"Absurd Manufacturing Bureau. 2023. Using face masks to deceive supermarket face payment machines. https:\/\/www.bilibili.com\/video\/BV1Lh4y1K7Go."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00487"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2322255"},{"key":"e_1_3_2_1_10_1","unstructured":"MEGVII Face. 2024. Face 3D Face Reconstruction Interface API. https:\/\/www.faceplusplus.com.cn\/3dface\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3450626.3459936"},{"key":"e_1_3_2_1_12_1","unstructured":"Thomas Gerig Andreas Morel-Forster Clemens Blumer Bernhard Egger Marcel L\u00fcthi Sandro Sch\u00f6nborn and Thomas Vetter. 2017. Morphable Face Models - An Open Framework. arxiv: 1709.08398 [cs.CV]"},{"key":"e_1_3_2_1_13_1","volume-title":"Generative adversarial nets. Advances in neural information processing systems","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. Advances in neural information processing systems, Vol. 27 (2014)."},{"key":"e_1_3_2_1_14_1","volume-title":"Improved training of wasserstein GANs (NIPS'17)","author":"Gulrajani Ishaan","unstructured":"Ishaan Gulrajani, Faruk Ahmed, Martin Arjovsky, Vincent Dumoulin, and Aaron Courville. 2017. Improved training of wasserstein GANs (NIPS'17). Curran Associates Inc., Red Hook, NY, USA, 5769--5779."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3615863"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSIAI.2010.5483908"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2017.05.008"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2014.0075"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484368"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2919284"},{"key":"e_1_3_2_1_21_1","volume-title":"3D face recognition: A survey. arXiv preprint arXiv:2108.11082","author":"Jing Yaping","year":"2021","unstructured":"Yaping Jing, Xuequan Lu, and Shang Gao. 2021. 3D face recognition: A survey. arXiv preprint arXiv:2108.11082 (2021)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41095-022-0317-1"},{"key":"e_1_3_2_1_23_1","volume-title":"Alias-free generative adversarial networks. Advances in neural information processing systems","author":"Karras Tero","year":"2021","unstructured":"Tero Karras, Miika Aittala, Samuli Laine, Erik H\u00e4rk\u00f6nen, Janne Hellsten, Jaakko Lehtinen, and Timo Aila. 2021. Alias-free generative adversarial networks. Advances in neural information processing systems, Vol. 34 (2021), 852--863."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3140687"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.377"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2013.12.010"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00046"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.104669"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130800.3130813"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02366"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278471.3278473"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00593"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100400"},{"key":"e_1_3_2_1_34_1","volume-title":"Advanced Materials Research","volume":"468","author":"Morovivc Ladislav","year":"2012","unstructured":"Ladislav Morovivc and Peter Pokorn\u1ef3. 2012. Optical 3D scanning of small parts. In Advanced Materials Research, Vol. 468. Trans Tech Publ, 2269--2273."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00592"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Pascal Paysan Reinhard Knothe Brian Amberg Sami Romdhani and Thomas Vetter. 2009. A 3D face model for pose and illumination invariant face recognition. In 2009 sixth IEEE international conference on advanced video and signal based surveillance. 296--301.","DOI":"10.1109\/AVSS.2009.58"},{"key":"e_1_3_2_1_37_1","unstructured":"Sarah Saunders. 2017. Cyber Security Firm Uses a 3D Printed Mask to Fool iPhone X's Facial Recognition Software. https:\/\/3dprint.com\/194079\/3d-printed-mask-iphone-x-face-id\/."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01801"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475639"},{"key":"e_1_3_2_1_40_1","volume-title":"3D Face Morphing Attacks: Generation, Vulnerability and Detection","author":"Singh Jag Mohan","year":"2023","unstructured":"Jag Mohan Singh and Raghavendra Ramachandra. 2023. 3D Face Morphing Attacks: Generation, Vulnerability and Detection. IEEE Transactions on Biometrics, Behavior, and Identity Science (2023)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2010.03.023"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2018.04.013"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413639"},{"key":"e_1_3_2_1_44_1","unstructured":"Tencent. 2024. Tencent cloud face recognition platform. https:\/\/intl.cloud.tencent.com\/ products\/facerecognition.html."},{"key":"e_1_3_2_1_45_1","unstructured":"Roosendaal Ton. 1995. Blender. https:\/\/www.blender.org\/."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.44"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3053458"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412514"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00611"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00917"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179429"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00666"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","unstructured":"Xiaojian Yuan Kejiang Chen Jie Zhang Weiming Zhang Nenghai Yu and Yang Zhang. 2023. Pseudo label-guided model inversion attack via conditional generative adversarial network. In Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence and Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence and Thirteenth Symposium on Educational Advances in Artificial Intelligence (AAAI'23\/IAAI'23\/EAAI'23). AAAI Press Article 373 9 pages. https:\/\/doi.org\/10.1609\/aaai.v37i3.25442","DOI":"10.1609\/aaai.v37i3.25442"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2016.7550062"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475386"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/954339.954342"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.23"}],"event":{"name":"MM '24: The 32nd ACM International Conference on Multimedia","location":"Melbourne VIC Australia","acronym":"MM '24","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 32nd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3680840","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664647.3680840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:08Z","timestamp":1750295888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3680840"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":58,"alternative-id":["10.1145\/3664647.3680840","10.1145\/3664647"],"URL":"https:\/\/doi.org\/10.1145\/3664647.3680840","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]},"assertion":[{"value":"2024-10-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}