{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T02:53:02Z","timestamp":1775271182668,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Knowledge Innovation Program of Wuhan-Basic Research"},{"name":"Natural Science Foundation of China","award":["61972169,62372203,62302186"],"award-info":[{"award-number":["61972169,62372203,62302186"]}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB2601802"],"award-info":[{"award-number":["2022YFB2601802"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Scientific and Technological Project of Hubei Province","award":["2022BAA046,2022BAA042"],"award-info":[{"award-number":["2022BAA046,2022BAA042"]}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2022M711251"],"award-info":[{"award-number":["2022M711251"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1145\/3664647.3681440","type":"proceedings-article","created":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T06:59:41Z","timestamp":1729925981000},"page":"2487-2496","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Rethinking Impersonation and Dodging Attacks on Face Recognition Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1117-1126","authenticated-orcid":false,"given":"Fengfan","family":"Zhou","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5331-050X","authenticated-orcid":false,"given":"Qianyu","family":"Zhou","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7825-943X","authenticated-orcid":false,"given":"Bangjie","family":"Yin","sequence":"additional","affiliation":[{"name":"Shanghai Shizhuang Information Technology Co., Ltd, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6711-3978","authenticated-orcid":false,"given":"Hui","family":"Zheng","sequence":"additional","affiliation":[{"name":"Shanghai Shizhuang Information Technology Co., Ltd, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0959-408X","authenticated-orcid":false,"given":"Xuequan","family":"Lu","sequence":"additional","affiliation":[{"name":"La Trobe University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1653-4341","authenticated-orcid":false,"given":"Lizhuang","family":"Ma","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6797-7412","authenticated-orcid":false,"given":"Hefei","family":"Ling","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00166"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01800"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134606"},{"key":"e_1_3_2_1_4_1","volume-title":"An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability. In International Conference on Computer Vision. 4466--4475","author":"Chen Bin","year":"2023","unstructured":"Bin Chen, Jia-Li Yin, Shukai Chen, Bohao Chen, and Ximeng Liu. 2023. An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability. In International Conference on Computer Vision. 4466--4475."},{"key":"e_1_3_2_1_5_1","volume-title":"International Conference on Learning Representations.","author":"Cherepanova Valeriia","year":"2021","unstructured":"Valeriia Cherepanova, Micah Goldblum, Harrison Foley, Shiyuan Duan, John P Dickerson, Gavin Taylor, and Tom Goldstein. 2021. LowKey: Leveraging Adversarial Attacks to Protect Social Media Users from Facial Recognition. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00421"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3087709"},{"key":"e_1_3_2_1_8_1","unstructured":"Junqi Gao Biqing Qi Yao Li Zhichang Guo Dong Li Yuming Xing and Dazhi Zhang. 2023. Perturbation Towards Easy Samples Improves Targeted Adversarial Transferability. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612070"},{"key":"e_1_3_2_1_10_1","unstructured":"Zhijin Ge Xiaosen Wang Hongying Liu Fanhua Shang and Yuanyuan Liu. 2023. Boosting Adversarial Transferability by Achieving Flat Local Maxima. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_11_1","volume-title":"International Conference on Learning Representations.","author":"Goodfellow Ian J","year":"2015","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and harnessing adversarial examples. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-021-00124-3"},{"key":"e_1_3_2_1_13_1","volume-title":"Deep Residual Learning for Image Recognition. In IEEE Conference on Computer Vision and Pattern Recognition. 770--778","author":"He Kaiming","year":"2016","unstructured":"Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep Residual Learning for Image Recognition. In IEEE Conference on Computer Vision and Pattern Recognition. 770--778."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013771"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01459"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00594"},{"key":"e_1_3_2_1_18_1","first-page":"34136","article-title":"Adv-Attribute: Inconspicuous and Transferable Adversarial Attack on Face Recognition","volume":"35","author":"Jia Shuai","year":"2022","unstructured":"Shuai Jia, Bangjie Yin, Taiping Yao, Shouhong Ding, Chunhua Shen, Xiaokang Yang, and Chao Ma. 2022. Adv-Attribute: Inconspicuous and Transferable Adversarial Attack on Face Recognition. In Advances in Neural Information Processing Systems, Vol. 35. 34136--34147.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_19_1","first-page":"13950","article-title":"learning transferable adversarial perturbations","volume":"34","author":"Nakka Krishna","year":"2021","unstructured":"Krishna kanth Nakka and Mathieu Salzmann. 2021. learning transferable adversarial perturbations. In Advances in Neural Information Processing Systems, Vol. 34. 13950--13962.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_20_1","volume-title":"International Conference on Learning Representation.","author":"Karras Tero","year":"2018","unstructured":"Tero Karras, Timo Aila, Samuli Laine, and Jaakko Lehtinen. 2018. Progressive Growing of GANs for Improved Quality, Stability, and Variation. In International Conference on Learning Representation."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01930"},{"key":"e_1_3_2_1_23_1","first-page":"32900","article-title":"Improving Adversarial Transferability via Intermediate-level Perturbation Decay","volume":"36","author":"Li Qizhang","year":"2023","unstructured":"Qizhang Li, Yiwen Guo, Wangmeng Zuo, and Hao Chen. 2023. Improving Adversarial Transferability via Intermediate-level Perturbation Decay. In Advances in Neural Information Processing Systems, Vol. 36. 32900--32912.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02366"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02359"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 40th International Conference on Machine Learning. 20763--20786","author":"Liang Chumeng","year":"2023","unstructured":"Chumeng Liang, Xiaoyu Wu, Yang Hua, Jiaru Zhang, Yiming Xue, Tao Song, Zhengui Xue, Ruhui Ma, and Haibing Guan. 2023. Adversarial example does good: Preventing painting imitation from diffusion models via adversarial examples. In Proceedings of the 40th International Conference on Machine Learning. 20763--20786."},{"key":"e_1_3_2_1_27_1","volume-title":"Frequency Domain Model Augmentation for Adversarial Attack. In European Conference on Computer Vision","volume":"13664","author":"Long Yuyang","year":"2022","unstructured":"Yuyang Long, Qilong Zhang, Boheng Zeng, Lianli Gao, Xianglong Liu, Jian Zhang, and Jingkuan Song. 2022. Frequency Domain Model Augmentation for Adversarial Attack. In European Conference on Computer Vision, Vol. 13664. 549--566."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00016"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01400"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475542"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00939"},{"key":"e_1_3_2_1_32_1","volume-title":"International Conference on Learning Representation.","author":"Naseer Muzammal","year":"2023","unstructured":"Muzammal Naseer, Ahmad Mahmood, Salman Khan, and Fahad Khan. 2023. Boosting Adversarial Transferability using Dynamic Cues. In International Conference on Learning Representation."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58568-6_2"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01973"},{"key":"e_1_3_2_1_36_1","volume-title":"International Conference on Learning Representation.","author":"Shayegani Erfan","year":"2024","unstructured":"Erfan Shayegani, Yue Dong, and Nael Abu-Ghazaleh. 2024. Jailbreak in pieces: Compositional adversarial attacks on multi-modal language models. In International Conference on Learning Representation."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00643"},{"key":"e_1_3_2_1_38_1","volume-title":"International Conference on Learning Representations.","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian J. Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00552"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3478324"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02297"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00078"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"e_1_3_2_1_44_1","volume-title":"TF-FAS: Twofold-Element Fine-Grained Semantic Guidance for Generalizable Face Anti-Spoofing. In European Conference on Computer Vision.","author":"Wang Xudong","year":"2024","unstructured":"Xudong Wang, Ke-Yue Zhang, Taiping Yao, Qianyu Zhou, Shouhong Ding, Pingyang Dai, and Rongrong Ji. 2024. TF-FAS: Twofold-Element Fine-Grained Semantic Guidance for Generalizable Face Anti-Spoofing. In European Conference on Computer Vision."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6906"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00425"},{"key":"e_1_3_2_1_47_1","volume-title":"Beneficial Perturbations Network for Defending Adversarial Examples. arXiv preprint arXiv:2009.12724","author":"Wen Shixian","year":"2020","unstructured":"Shixian Wen and Laurent Itti. 2020. Beneficial Perturbations Network for Defending Adversarial Examples. arXiv preprint arXiv:2009.12724 (2020)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01167"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2730--2739","author":"Xie Cihang","unstructured":"Cihang Xie, Zhishuai Zhang, Yuyin Zhou, Song Bai, Jianyu Wang, Zhou Ren, and Alan L. Yuille. 2019. Improving Transferability of Adversarial Examples With Input Diversity. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2730--2739."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00387"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00401"},{"key":"e_1_3_2_1_52_1","volume-title":"Robfr: Benchmarking adversarial robustness on face recognition. arXiv preprint arXiv:2007.04118","author":"Yang Xiao","year":"2020","unstructured":"Xiao Yang, Dingcheng Yang, Yinpeng Dong, Hang Su, Wenjian Yu, and Jun Zhu. 2020. Robfr: Benchmarking adversarial robustness on face recognition. arXiv preprint arXiv:2007.04118 (2020)."},{"key":"e_1_3_2_1_53_1","volume-title":"Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition. In International Joint Conference on Artificial Intelligence. 1252--1258","author":"Yin Bangjie","year":"2021","unstructured":"Bangjie Yin, Wenxuan Wang, Taiping Yao, Junfeng Guo, Zelun Kong, Shouhong Ding, Jilin Li, and Cong Liu. 2021. Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition. In International Joint Conference on Artificial Intelligence. 1252--1258."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20065-6_1"},{"key":"e_1_3_2_1_55_1","volume-title":"Npcface: Negative-positive collaborative training for large-scale face recognition. arXiv preprint arXiv:2007.10172","author":"Zeng Dan","year":"2020","unstructured":"Dan Zeng, Hailin Shi, Hang Du, Jun Wang, Zhen Lei, and Tao Mei. 2020. Npcface: Negative-positive collaborative training for large-scale face recognition. arXiv preprint arXiv:2007.10172 (2020)."},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 14973--14982","author":"Zhang Jianping","unstructured":"Jianping Zhang, Weibin Wu, Jen-tse Huang, Yizhan Huang, Wenxuan Wang, Yuxin Su, and Michael R. Lyu. 2022. Improving Adversarial Transferability via Neuron Attribution-based Attacks. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 14973--14982."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3547801"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3036801"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10447402"},{"key":"e_1_3_2_1_60_1","volume-title":"Improving the transferability of adversarial attacks on face recognition with beneficial perturbation feature augmentation","author":"Zhou Fengfan","year":"2023","unstructured":"Fengfan Zhou, Hefei Ling, Yuxuan Shi, Jiazhong Chen, Zongyi Li, and Ping Li. 2023. Improving the transferability of adversarial attacks on face recognition with beneficial perturbation feature augmentation. IEEE Transactions on Computational Social Systems (2023)."},{"key":"e_1_3_2_1_61_1","volume-title":"Adversarial Attacks on Both Face Recognition and Face Anti-spoofing Models. arXiv preprint arXiv:2405.16940","author":"Zhou Fengfan","year":"2024","unstructured":"Fengfan Zhou, Qianyu Zhou, Xiangtai Li, Xuequan Lu, Lizhuang Ma, and Hefei Ling. 2024. Adversarial Attacks on Both Face Recognition and Face Anti-spoofing Models. arXiv preprint arXiv:2405.16940 (2024)."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00025"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01959"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3547769"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20065-6_20"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612454"}],"event":{"name":"MM '24: The 32nd ACM International Conference on Multimedia","location":"Melbourne VIC Australia","acronym":"MM '24","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 32nd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3681440","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664647.3681440","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:57:47Z","timestamp":1750294667000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3681440"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":65,"alternative-id":["10.1145\/3664647.3681440","10.1145\/3664647"],"URL":"https:\/\/doi.org\/10.1145\/3664647.3681440","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]},"assertion":[{"value":"2024-10-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}