{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T23:01:28Z","timestamp":1760482888608,"version":"3.41.0"},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"11","license":[{"start":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T00:00:00Z","timestamp":1730937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"JSPS KAKENHI","award":["JP21H04907"],"award-info":[{"award-number":["JP21H04907"]}]},{"name":"JST CREST","award":["JPMJCR18A6 and JPMJCR20D3"],"award-info":[{"award-number":["JPMJCR18A6 and JPMJCR20D3"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62376003"],"award-info":[{"award-number":["62376003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100003995","name":"Anhui Provincial Natural Science Foundation","doi-asserted-by":"crossref","award":["2308085MF200"],"award-info":[{"award-number":["2308085MF200"]}],"id":[{"id":"10.13039\/501100003995","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Faculty Initiatives Research, Monash University","award":["2901912"],"award-info":[{"award-number":["2901912"]}]},{"name":"e.INS-Ecosystem of Innovation for Next Generation Sardinia","award":["ECS 00000038"],"award-info":[{"award-number":["ECS 00000038"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2024,11,30]]},"abstract":"<jats:p>Deep learning-based identity management systems, such as face authentication systems, are vulnerable to adversarial attacks. However, existing attacks are typically designed for single-task purposes, which means they are tailored to exploit vulnerabilities unique to the individual target rather than being adaptable for multiple users or systems. This limitation makes them unsuitable for certain attack scenarios, such as morphing, universal, transferable, and counterattacks. In this article, we propose a multi-task adversarial attack algorithm called MTADV that are adaptable for multiple users or systems. By interpreting these scenarios as multi-task attacks, MTADV is applicable to both single- and multi-task attacks, and feasible in the white- and gray-box settings. Furthermore, MTADV is effective against various face datasets, including LFW, CelebA, and CelebA-HQ, and can work with different deep learning models, such as FaceNet, InsightFace, and CurricularFace. Importantly, MTADV retains its feasibility as a single-task attack targeting a single user\/system. To the best of our knowledge, MTADV is the first adversarial attack method that can target all of the aforementioned scenarios in one algorithm.<\/jats:p>","DOI":"10.1145\/3665496","type":"journal-article","created":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T20:50:32Z","timestamp":1716324632000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A Multi-Task Adversarial Attack against Face Authentication"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-0498-2712","authenticated-orcid":false,"given":"Hanrui","family":"Wang","sequence":"first","affiliation":[{"name":"National Institute of Informatics, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8938-2364","authenticated-orcid":false,"given":"Shuo","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2926-9762","authenticated-orcid":false,"given":"Cunjian","family":"Chen","sequence":"additional","affiliation":[{"name":"Monash University, Clayton Melbourne, Victoria, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3406-3048","authenticated-orcid":false,"given":"Massimo","family":"Tistarelli","sequence":"additional","affiliation":[{"name":"University of Sassari, Sassari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4501-7992","authenticated-orcid":false,"given":"Zhe","family":"Jin","sequence":"additional","affiliation":[{"name":"Anhui University, Hefei, China"}]}],"member":"320","published-online":{"date-parts":[[2024,11,7]]},"reference":[{"key":"e_1_3_1_2_2","first-page":"22","volume-title":"International conference on learning representations (ICLR)","author":"Buckman Jacob","year":"2018","unstructured":"Jacob Buckman, Aurko Roy, Colin Raffel, and Ian Goodfellow. 2018. Thermometer encoding: One hot way to resist adversarial examples. In International conference on learning representations (ICLR). ICLR, Vancouver, BC, Canada, 22 pages."},{"key":"e_1_3_1_3_2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/3128572.3140444","volume-title":"Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security (AISec)","author":"Carlini Nicholas","year":"2017","unstructured":"Nicholas Carlini and David Wagner. 2017a. Adversarial examples are not easily detected: Bypassing ten detection methods. In Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security (AISec). ACM, New York, NY, 3\u201314."},{"key":"e_1_3_1_4_2","first-page":"39","volume-title":"Proceedings of IEEE Symposium on Security and Privacy (S & P\u201917)","author":"Carlini Nicholas","year":"2017","unstructured":"Nicholas Carlini and David Wagner. 2017b. Towards evaluating the robustness of neural networks. In Proceedings of IEEE Symposium on Security and Privacy (S & P\u201917). IEEE, San Jose, CA, USA, 39\u201357."},{"key":"e_1_3_1_5_2","first-page":"1979","volume-title":"Proceedings of IEEE Winter Conference on Applications of Computer Vision (WACV\u201919)","author":"Dabouei Ali","year":"2019","unstructured":"Ali Dabouei, Sobhan Soleymani, Jeremy Dawson, and Nasser Nasrabadi. 2019. Fast geometrically-perturbed adversarial faces. In Proceedings of IEEE Winter Conference on Applications of Computer Vision (WACV\u201919). IEEE, Waikoloa Village, HI, USA, 1979\u20131988."},{"key":"e_1_3_1_6_2","first-page":"1","volume-title":"Proceedings of IEEE International Joint Conference on Biometrics (IJCB\u201920)","author":"Deb Debayan","year":"2019","unstructured":"Debayan Deb, Jianbang Zhang, and Anil K. Jain. 2019. Advfaces: Adversarial face synthesis. In Proceedings of IEEE International Joint Conference on Biometrics (IJCB\u201920). IEEE, Online, 1\u201310."},{"key":"e_1_3_1_7_2","first-page":"4690","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Deng Jiankang","year":"2019","unstructured":"Jiankang Deng, Jia Guo, Niannan Xue, and Stefanos Zafeiriou. 2019. Arcface: Additive angular margin loss for deep face recognition. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, Long Beach, CA, USA, 4690\u20134699."},{"key":"e_1_3_1_8_2","first-page":"13","volume-title":"International Conference on Learning Representations (ICLR)","author":"Dhillon Guneet S.","year":"2018","unstructured":"Guneet S. Dhillon, Kamyar Azizzadenesheli, Zachary C. Lipton, Jeremy D. Bernstein, Jean Kossaifi, Aran Khanna, and Animashree Anandkumar. 2018. Stochastic activation pruning for robust adversarial defense. In International Conference on Learning Representations (ICLR). ICLR, Vancouver, BC, Canada, 13 pages."},{"key":"e_1_3_1_9_2","first-page":"1","volume-title":"IEEE International Joint Conference on Biometrics (IJCB)","author":"Ferrara Matteo","year":"2014","unstructured":"Matteo Ferrara, Annalisa Franco, and Davide Maltoni. 2014. The magic passport. In IEEE International Joint Conference on Biometrics (IJCB). IEEE, Clearwater, FL, USA, 1\u20137."},{"key":"e_1_3_1_10_2","first-page":"697","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence (AAAI)","author":"Ghamizi Salah","year":"2022","unstructured":"Salah Ghamizi, Maxime Cordy, Mike Papadakis, and Yves Le Traon. 2022. Adversarial robustness in multi-task learning: Promises and illusions. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI). AAAI, Pomona, CA, USA, 697\u2013705."},{"key":"e_1_3_1_11_2","first-page":"11","volume-title":"International Conference on Learning Representations (ICLR)","author":"Goodfellow Ian","year":"2015","unstructured":"Ian Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and harnessing adversarial examples. In International Conference on Learning Representations (ICLR). ICLR, San Diego, CA, USA, 11 pages. Retrieved from http:\/\/arxiv.org\/abs\/1412.6572"},{"key":"e_1_3_1_12_2","unstructured":"Kathrin Grosse Praveen Manoharan Nicolas Papernot Michael Backes and Patrick McDaniel. 2017. On the (statistical) detection of adversarial examples. arXiv:1702.06280 13 pages."},{"key":"e_1_3_1_13_2","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1186\/s13635-021-00124-3","article-title":"Multitask adversarial attack with dispersion amplification","volume":"1","author":"Haleta Pavlo","year":"2021","unstructured":"Pavlo Haleta, Dmytro Likhomanov, and Oleksandra Sokol. 2021. Multitask adversarial attack with dispersion amplification. EURASIP Journal on Information Security 2021, 1 (2021), 10.","journal-title":"EURASIP Journal on Information Security"},{"key":"e_1_3_1_14_2","first-page":"770","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"He Kaiming","year":"2016","unstructured":"Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, Las Vegas, NV, USA, 770\u2013778."},{"key":"e_1_3_1_15_2","first-page":"7132","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Hu Jie","year":"2018","unstructured":"Jie Hu, Li Shen, and Gang Sun. 2018. Squeeze-and-excitation networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, Salt Lake City, UT, USA, 7132\u20137141."},{"key":"e_1_3_1_16_2","volume-title":"Labeled faces in the wild: A database for studying face recognition in unconstrained environments","author":"Huang Gary B.","year":"2007","unstructured":"Gary B. Huang, Manu Ramesh, Tamara Berg, and Erik Learned-Miller. 2007. Labeled faces in the wild: A database for studying face recognition in unconstrained environments. Technical Report 07-49. University of Massachusetts, Amherst."},{"key":"e_1_3_1_17_2","first-page":"5901","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer vision and pattern recognition (CVPR)","author":"Huang Yuge","year":"2020","unstructured":"Yuge Huang, Yuhan Wang, Ying Tai, Xiaoming Liu, Pengcheng Shen, Shaoxin Li, Jilin Li, and Feiyue Huang. 2020. Curricularface: Adaptive curriculum learning loss for deep face recognition. In Proceedings of the IEEE\/CVF Conference on Computer vision and pattern recognition (CVPR). IEEE, Seattle, WA, USA, 5901\u20135910."},{"key":"e_1_3_1_18_2","first-page":"26","volume-title":"International Conference on Learning Representations (ICLR)","author":"Karras Tero","year":"2018","unstructured":"Tero Karras, Timo Aila, Samuli Laine, and Jaakko Lehtinen. 2018. Progressive growing of GANs for improved quality, stability, and variation. In International Conference on Learning Representations (ICLR). ICLR, Vancouver Canada, 26 pages."},{"key":"e_1_3_1_19_2","first-page":"17","volume-title":"International Conference on Learning Representations (ICLR)","author":"Kurakin Alexey","year":"2017","unstructured":"Alexey Kurakin, Ian J. Goodfellow, and Samy Bengio. 2017. Adversarial machine learning at scale. In International Conference on Learning Representations (ICLR). ICLR, Toulon, France, 17 pages."},{"key":"e_1_3_1_20_2","doi-asserted-by":"crossref","first-page":"3170","DOI":"10.1109\/TIFS.2021.3073802","article-title":"Efficient known-sample attack for distance-preserving hashing biometric template protection schemes","volume":"16","author":"Lai Yenlung","year":"2021","unstructured":"Yenlung Lai, Zhe Jin, KokSheik Wong, and Massimo Tistarelli. 2021. Efficient known-sample attack for distance-preserving hashing biometric template protection schemes. IEEE Transactions on Information Forensics and Security 16 (2021), 3170\u20133185.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_1_21_2","first-page":"5764","volume-title":"Proceedings of the IEEE International Conference on Computer Vision (ICCV)","author":"Li Xin","year":"2017","unstructured":"Xin Li and Fuxin Li. 2017. Adversarial examples detection in deep networks with convolutional filter statistics. In Proceedings of the IEEE International Conference on Computer Vision (ICCV). IEEE, Venice, Italy, 5764\u20135772."},{"key":"e_1_3_1_22_2","first-page":"24626","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Li Zexin","year":"2023","unstructured":"Zexin Li, Bangjie Yin, Taiping Yao, Junfeng Guo, Shouhong Ding, Simin Chen, and Cong Liu. 2023. Sibling-attack: Rethinking transferable adversarial attacks against face recognition. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, Vancouver, BC, Canada, 24626\u201324637."},{"issue":"8","key":"e_1_3_1_23_2","doi-asserted-by":"crossref","first-page":"13562","DOI":"10.3934\/mbe.2023605","article-title":"Attention distraction with gradient sharpening for multi-task adversarial attack","volume":"20","author":"Liu Bingyu","year":"2023","unstructured":"Bingyu Liu, Jiani Hu, and Weihong Deng. 2023. Attention distraction with gradient sharpening for multi-task adversarial attack. Mathematical Biosciences and Engineering 20, 8 (2023), 13562\u201313580.","journal-title":"Mathematical Biosciences and Engineering"},{"key":"e_1_3_1_24_2","first-page":"212","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Liu Weiyang","year":"2017","unstructured":"Weiyang Liu, Yandong Wen, Zhiding Yu, Ming Li, Bhiksha Raj, and Le Song. 2017. Sphereface: Deep hypersphere embedding for face recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, Honolulu, HI, USA, 212\u2013220."},{"key":"e_1_3_1_25_2","first-page":"3730","volume-title":"Proceedings of the IEEE International Conference on Computer Vision (ICCV)","author":"Liu Ziwei","year":"2015","unstructured":"Ziwei Liu, Ping Luo, Xiaogang Wang, and Xiaoou Tang. 2015. Deep learning face attributes in the wild. In Proceedings of the IEEE International Conference on Computer Vision (ICCV). IEEE, Santiago, Chile, 3730\u20133738."},{"key":"e_1_3_1_26_2","first-page":"28","volume-title":"International Conference on Learning Representations (ICLR)","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards deep learning models resistant to adversarial attacks. In International Conference on Learning Representations (ICLR). ICLR, Vancouver, BC, Canada, 28 pages."},{"key":"e_1_3_1_27_2","first-page":"2574","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Moosavi-Dezfooli Seyed-Mohsen","year":"2016","unstructured":"Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, and Pascal Frossard. 2016. Deepfool: A simple and accurate method to fool deep neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, Las Vegas, NV, USA, 2574\u20132582."},{"key":"e_1_3_1_28_2","first-page":"16805","volume-title":"International Conference on Machine Learning (ICML)","author":"Nie Weili","year":"2022","unstructured":"Weili Nie, Brandon Guo, Yujia Huang, Chaowei Xiao, Arash Vahdat, and Anima Anandkumar. 2022. Diffusion models for adversarial purification. In International Conference on Machine Learning (ICML). PMLR, Baltimore, MD, USA, 16805\u201316827."},{"key":"e_1_3_1_29_2","first-page":"6","volume-title":"Reliable Machine Learning in the Wild Workshop, 34th International Conference on Machine Learning (ICML)","author":"Rauber Jonas","year":"2017","unstructured":"Jonas Rauber, Wieland Brendel, and Matthias Bethge. 2017. Foolbox: A Python toolbox to benchmark the robustness of machine learning models. In Reliable Machine Learning in the Wild Workshop, 34th International Conference on Machine Learning (ICML). PMLR, Sydney, Australia, 6 pages. Retrieved from http:\/\/arxiv.org\/abs\/1707.04131"},{"key":"e_1_3_1_30_2","first-page":"53","article-title":"Foolbox native: Fast adversarial attacks to benchmark the robustness of machine learning models in pytorch, tensorflow, and jax","volume":"5","author":"Rauber Jonas","year":"2020","unstructured":"Jonas Rauber, Roland Zimmermann, Matthias Bethge, and Wieland Brendel. 2020. Foolbox native: Fast adversarial attacks to benchmark the robustness of machine learning models in pytorch, tensorflow, and jax. Journal of Open Source Software 5, 53 (2020), 2607.","journal-title":"Journal of Open Source Software"},{"key":"e_1_3_1_31_2","doi-asserted-by":"crossref","first-page":"2947","DOI":"10.1109\/TIFS.2022.3195384","article-title":"Perturbation inactivation based adversarial defense for face recognition","volume":"17","author":"Ren Min","year":"2022","unstructured":"Min Ren, Yuhao Zhu, Yunlong Wang, and Zhenan Sun. 2022. Perturbation inactivation based adversarial defense for face recognition. IEEE Transactions on Information Forensics and Security 17 (2022), 2947\u20132962.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_1_32_2","first-page":"17","volume-title":"International Conference on Learning Representations (ICLR)","author":"Samangouei Pouya","year":"2018","unstructured":"Pouya Samangouei, Maya Kabkab, and Rama Chellappa. 2018. Defense-GAN: Protecting classifiers against adversarial attacks using generative models. In International Conference on Learning Representations (ICLR). ICLR, Vancouver, BC, Canada, 17 pages."},{"key":"e_1_3_1_33_2","first-page":"815","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Schroff Florian","year":"2015","unstructured":"Florian Schroff, Dmitry Kalenichenko, and James Philbin. 2015. Facenet: A unified embedding for face recognition and clustering. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, Boston, MA, USA, 815\u2013823."},{"key":"e_1_3_1_34_2","unstructured":"Yi Sun Ding Liang Xiaogang Wang and Xiaoou Tang. 2015. Deepid3: Face recognition with very deep neural networks. arXiv:1502.00873 5 pages."},{"key":"e_1_3_1_35_2","first-page":"10","volume-title":"Proceedings of the Second International Conference on Learning Representations (ICLR)","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In Proceedings of the Second International Conference on Learning Representations (ICLR). ICLR, Banff, AB, Canada, 10 pages."},{"key":"e_1_3_1_36_2","first-page":"1701","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Taigman Yaniv","year":"2014","unstructured":"Yaniv Taigman, Ming Yang, Marc\u2019Aurelio Ranzato, and Lior Wolf. 2014. Deepface: Closing the gap to human-level performance in face verification. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, Columbus, OH, USA, 1701\u20131708."},{"key":"e_1_3_1_37_2","first-page":"1","volume-title":"IEEE International Conference on Automatic Face and Gesture Recognition 2021 (FG)","author":"Wang Hanrui","year":"2021","unstructured":"Hanrui Wang, Shuo Wang, Zhe Jin, Yandan Wang, Cunjian Chen, and Massimo Tistarell. 2021. Similarity-based gray-box adversarial attack against deep face recognition. In IEEE International Conference on Automatic Face and Gesture Recognition 2021 (FG). IEEE, Online, 1\u20138."},{"key":"e_1_3_1_38_2","first-page":"5265","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Wang Hao","year":"2018","unstructured":"Hao Wang, Yitong Wang, Zheng Zhou, Xing Ji, Dihong Gong, Jingchao Zhou, Zhifeng Li, and Wei Liu. 2018. Cosface: Large margin cosine loss for deep face recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, Salt Lake City, UT, USA, 5265\u20135274."},{"key":"e_1_3_1_39_2","first-page":"1145","volume-title":"Proceedings of the 23rd ACM International Conference on Knowledge Discovery and Data Mining (ACM SIGKDD)","author":"Wang Qinglong","year":"2017","unstructured":"Qinglong Wang, Wenbo Guo, Kaixuan Zhang, Alexander G. Ororbia, Xinyu Xing, Xue Liu, and C. Lee Giles. 2017. Adversary resistant deep neural networks with an application to malware detection. In Proceedings of the 23rd ACM International Conference on Knowledge Discovery and Data Mining (ACM SIGKDD). ACM, New York, NY, 1145\u20131153."},{"issue":"4","key":"e_1_3_1_40_2","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","article-title":"Image quality assessment: from error visibility to structural similarity","volume":"13","author":"Wang Zhou","year":"2004","unstructured":"Zhou Wang, Alan C. Bovik, Hamid R. Sheikh, and Eero P. Simoncelli. 2004. Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing 13, 4 (2004), 600\u2013612.","journal-title":"IEEE Transactions on Image Processing"},{"key":"e_1_3_1_41_2","first-page":"17","volume-title":"International Conference on Learning Representations","author":"Wong Eric","year":"2020","unstructured":"Eric Wong, Leslie Rice, and J. Zico Kolter. 2020. Fast is better than free: Revisiting adversarial training. In International Conference on Learning Representations. ICLR, Addis Ababa, Ethiopia, 17 pages."},{"key":"e_1_3_1_42_2","first-page":"15","volume-title":"Proceedings of the 2018 Network and Distributed Systems Security Symposium (NDSS)","author":"Xu Weilin","year":"2018","unstructured":"Weilin Xu, David Evans, and Yanjun Qi. 2018. Feature squeezing: Detecting adversarial examples in deep neural networks. In Proceedings of the 2018 Network and Distributed Systems Security Symposium (NDSS). IEEE, San Diego, CA, USA, 15 pages."},{"issue":"1","key":"e_1_3_1_43_2","doi-asserted-by":"crossref","first-page":"855","DOI":"10.1007\/s11042-020-09604-z","article-title":"Attacks on state-of-the-art face recognition using attentional adversarial attack generative network","volume":"80","author":"Yang Lu","year":"2021","unstructured":"Lu Yang, Qing Song, and Yingqi Wu. 2021. Attacks on state-of-the-art face recognition using attentional adversarial attack generative network. Multimedia Tools and Applications 80, 1 (2021), 855\u2013875.","journal-title":"Multimedia Tools and Applications"},{"issue":"10","key":"e_1_3_1_44_2","doi-asserted-by":"crossref","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","article-title":"Joint face detection and alignment using multitask cascaded convolutional networks","volume":"23","author":"Zhang Kaipeng","year":"2016","unstructured":"Kaipeng Zhang, Zhanpeng Zhang, Zhifeng Li, and Yu Qiao. 2016. Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Processing Letters 23, 10 (2016), 1499\u20131503.","journal-title":"IEEE Signal Processing Letters"},{"key":"e_1_3_1_45_2","first-page":"586","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Zhang Richard","year":"2018","unstructured":"Richard Zhang, Phillip Isola, Alexei A. Efros, Eli Shechtman, and Oliver Wang. 2018. The unreasonable effectiveness of deep features as a perceptual metric. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, Salt Lake City, UT, USA, 586\u2013595."},{"key":"e_1_3_1_46_2","doi-asserted-by":"crossref","first-page":"1452","DOI":"10.1109\/TIFS.2020.3036801","article-title":"Towards transferable adversarial attack against deep face recognition","volume":"16","author":"Zhong Yaoyao","year":"2020","unstructured":"Yaoyao Zhong and Weihong Deng. 2020. Towards transferable adversarial attack against deep face recognition. IEEE Transactions on Information Forensics and Security 16 (2020), 1452\u20131466.","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3665496","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3665496","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:57:13Z","timestamp":1750291033000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3665496"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,7]]},"references-count":45,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2024,11,30]]}},"alternative-id":["10.1145\/3665496"],"URL":"https:\/\/doi.org\/10.1145\/3665496","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"type":"print","value":"1551-6857"},{"type":"electronic","value":"1551-6865"}],"subject":[],"published":{"date-parts":[[2024,11,7]]},"assertion":[{"value":"2023-03-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-12","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}