{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T19:21:34Z","timestamp":1765308094020,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","funder":[{"name":"This work is supported by Hubei Provincial Key Research and Development Program.","award":["2024BAB050, 2024BAB039"],"award-info":[{"award-number":["2024BAB050, 2024BAB039"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.1145\/3746027.3755016","type":"proceedings-article","created":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T05:47:42Z","timestamp":1761371262000},"page":"7625-7634","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["FAB-Attack: Fabric-Aware Adversarial Attacks on Person Detectors under Motion Blur"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-4339-7906","authenticated-orcid":false,"given":"Jiaqi","family":"Hou","sequence":"first","affiliation":[{"name":"National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6038-5279","authenticated-orcid":false,"given":"Kewei","family":"Zhang","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8931-7008","authenticated-orcid":false,"given":"Tianyu","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2929-8442","authenticated-orcid":false,"given":"Chengyu","family":"Jia","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6375-2863","authenticated-orcid":false,"given":"Qiqi","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Software and Microelectronics, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2144-2065","authenticated-orcid":false,"given":"Hui","family":"Wei","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3846-9157","authenticated-orcid":false,"given":"Zheng","family":"Wang","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International conference on machine learning. PMLR, 284-293","author":"Athalye Anish","year":"2018","unstructured":"Anish Athalye, Logan Engstrom, Andrew Ilyas, and Kevin Kwok. 2018. Synthesizing robust adversarial examples. In International conference on machine learning. PMLR, 284-293."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3596711.3596792"},{"key":"e_1_3_2_1_3_1","volume-title":"NeurIPS Workshop.","author":"Brown Tom B","year":"2017","unstructured":"Tom B Brown, Dandelion Man\u00e9, Aurko Roy, Mart\u00edn Abadi, and Justin Gilmer. 2017. Adversarial patch. In NeurIPS Workshop."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19889"},{"key":"e_1_3_2_1_5_1","volume-title":"End-to-End Object Detection with Transformers. In European conference on computer vision.","author":"Carion Nicolas","year":"2020","unstructured":"Nicolas Carion, Francisco Massa, Gabriel Synnaeve, Nicolas Usunier, Alexander Kirillov, and Sergey Zagoruyko. 2020. End-to-End Object Detection with Transformers. In European conference on computer vision."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.129042"},{"key":"e_1_3_2_1_7_1","volume-title":"Simple Baselines for Image Restoration. arXiv preprint arXiv:2204.04676","author":"Chen Liangyu","year":"2022","unstructured":"Liangyu Chen, Xiaojie Chu, Xiangyu Zhang, and Jian Sun. 2022. Simple Baselines for Image Restoration. arXiv preprint arXiv:2204.04676 (2022)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3334618"},{"volume-title":"Computer vision and pattern recognition","author":"Farhadi Ali","key":"e_1_3_2_1_9_1","unstructured":"Ali Farhadi and Joseph Redmon. 2018. Yolov3: An incremental improvement. In Computer vision and pattern recognition, Vol. 1804. Springer Berlin\/Heidelberg, Germany, 1-6."},{"key":"e_1_3_2_1_10_1","volume-title":"Ihsen Alouani, and Muhammad Shafique.","author":"Guesmi Amira","year":"2024","unstructured":"Amira Guesmi, Ruitian Ding, Muhammad Abdullah Hanif, Ihsen Alouani, and Muhammad Shafique. 2024. Dap: A dynamic adversarial patch for evading person detectors. 24595-24604."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2024.105552"},{"key":"e_1_3_2_1_13_1","volume-title":"Jun-Cheng Chen, Kai-Lung Hua, and Wen-Huang Cheng.","author":"Hu Chih-Tuan","year":"2021","unstructured":"Yu-Chih-Tuan Hu, Bo-Han Kung, Daniel Stanley Tan, Jun-Cheng Chen, Kai-Lung Hua, and Wen-Huang Cheng. 2021. Naturalistic Physical Adversarial Patch for Object Detectors."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Zhanhao Hu Wenda Chu Xiaopei Zhu Hui Zhang Bo Zhang and Xiaolin Hu. 2023. Physically realizable natural-looking clothing textures evade person detectors via 3d modeling. 16975-16984.","DOI":"10.1109\/CVPR52729.2023.01628"},{"key":"e_1_3_2_1_15_1","unstructured":"Zhanhao Hu Siyuan Huang Xiaopei Zhu Fuchun Sun Bo Zhang and Xiaolin Hu. 2022. Adversarial Texture for Fooling Person Detectors in the Physical World. 13307-13316."},{"key":"e_1_3_2_1_16_1","volume-title":"T-sea: Transfer-based self-ensemble attack on object detection. 20514-20523.","author":"Huang Hao","year":"2023","unstructured":"Hao Huang, Ziyan Chen, Huanran Chen, Yongtao Wang, and Kevin Zhang. 2023. T-sea: Transfer-based self-ensemble attack on object detection. 20514-20523."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Lifeng Huang Chengying Gao Yuyin Zhou Cihang Xie Alan L Yuille Changqing Zou and Ning Liu. 2020. Universal physical camouflage attacks on object detectors. 720-729.","DOI":"10.1109\/CVPR42600.2020.00080"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00091"},{"key":"e_1_3_2_1_19_1","unstructured":"Glenn Jocher Ayush Chaurasia and Jing Qiu. 2023. Ultralytics YOLOv8. https:\/\/github.com\/ultralytics\/ultralytics"},{"key":"e_1_3_2_1_20_1","unstructured":"Glenn Jocher and Jing Qiu. 2024. Ultralytics YOLO11. https:\/\/github.com\/ultralytics\/ultralytics"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00210"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i2.25281"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00288"},{"key":"e_1_3_2_1_25_1","volume-title":"Faster r-cnn: Towards real-time object detection with region proposal networks. Advances in neural information processing systems","author":"Ren Shaoqing","year":"2015","unstructured":"Shaoqing Ren, Kaiming He, Ross Girshick, and Jian Sun. 2015. Faster r-cnn: Towards real-time object detection with region proposal networks. Advances in neural information processing systems, Vol. 28 (2015)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"e_1_3_2_1_27_1","volume-title":"2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, April 14-16, 2014, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.). http:\/\/arxiv.org\/abs\/1312","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian J. Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In 2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, April 14-16, 2014, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.). http:\/\/arxiv.org\/abs\/1312.6199"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475653"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475653"},{"key":"e_1_3_2_1_30_1","volume-title":"Wiebe Van Ranst, and Toon Goedem\u00e9","author":"Thys Simen","year":"2019","unstructured":"Simen Thys, Wiebe Van Ranst, and Toon Goedem\u00e9. 2019. Fooling automated surveillance cameras: adversarial patches to attack person detection. 0-0."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW63382.2024.00699"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00568"},{"key":"e_1_3_2_1_33_1","unstructured":"Ultralytics. 2020. yolov5. https:\/\/github.com\/ultralytics\/yolov5. Accessed: 2024-03-04."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00846"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-024-02098-4"},{"key":"e_1_3_2_1_36_1","volume-title":"Image quality assessment: from error visibility to structural similarity","author":"Wang Zhou","year":"2004","unstructured":"Zhou Wang, Alan C Bovik, Hamid R Sheikh, and Eero P Simoncelli. 2004. Image quality assessment: from error visibility to structural similarity. IEEE transactions on image processing, Vol. 13, 4 (2004), 600-612."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01716"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01716"},{"key":"e_1_3_2_1_39_1","volume-title":"Luc Van Gool, and Zheng Wang","author":"Wei Hui","year":"2024","unstructured":"Hui Wei, Hao Tang, Xuemei Jia, Zhixiang Wang, Hanxun Yu, Zhubo Li, Shin'ichi Satoh, Luc Van Gool, and Zheng Wang. 2024a. Physical adversarial attack meets computer vision: A decade survey. (2024)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Hui Wei Zhixiang Wang Xuemei Jia Yinqiang Zheng Hao Tang Shin'ichi Satoh and Zheng Wang. 2023a. HOTCOLD Block: Fooling Thermal Infrared Detectors with a Novel Wearable Design. In AAAI.","DOI":"10.1609\/aaai.v37i12.26777"},{"key":"e_1_3_2_1_41_1","first-page":"8047","article-title":"Revisiting adversarial patches for designing camera-agnostic attacks against person detection","volume":"37","author":"Wei Hui","year":"2024","unstructured":"Hui Wei, Zhixiang Wang, Kewei Zhang, Jiaqi Hou, Yuanwei Liu, Hao Tang, and Zheng Wang. 2024b. Revisiting adversarial patches for designing camera-agnostic attacks against person detection. Advances in Neural Information Processing Systems, Vol. 37 (2024), 8047-8064.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3611910"},{"volume-title":"Making an invisibility cloak: Real world adversarial attacks on object detectors","author":"Wu Zuxuan","key":"e_1_3_2_1_43_1","unstructured":"Zuxuan Wu, Ser-Nam Lim, Larry S Davis, and Tom Goldstein. 2020. Making an invisibility cloak: Real world adversarial attacks on object detectors. Springer, 1-17."},{"key":"e_1_3_2_1_44_1","unstructured":"Kaidi Xu Gaoyuan Zhang Sijia Liu Quanfu Fan Mengshu Sun Hongge Chen Pin-Yu Chen Yanzhi Wang and Xue Lin. 2020. Adversarial t-shirt! evading person detectors in a physical world."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17259"},{"key":"e_1_3_2_1_46_1","volume-title":"Electronics & Mobile Communication Conference (UEMCON). IEEE, 368-374","author":"Yang Darren Yu","year":"2018","unstructured":"Darren Yu Yang, Jay Xiong, Xincheng Li, Xu Yan, John Raiti, Yuntao Wang, HuaQiang Wu, and Zhenyu Zhong. 2018. Building Towards'' Invisible Cloak'': Robust Physical Adversarial Attack on YOLO Object Detector. In 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 368-374."},{"key":"e_1_3_2_1_47_1","volume-title":"Fahad Shahbaz Khan, and Ming-Hsuan Yang","author":"Zamir Syed Waqas","year":"2022","unstructured":"Syed Waqas Zamir, Aditya Arora, Salman Khan, Munawar Hayat, Fahad Shahbaz Khan, and Ming-Hsuan Yang. 2022. Restormer: Efficient Transformer for High-Resolution Image Restoration. In CVPR."},{"key":"e_1_3_2_1_48_1","unstructured":"Shibo Zhang Yushi Cheng Wenjun Zhu Xiaoyu Ji and Wenyuan Xu. 2023. CAPatch: Physical Adversarial Patch against Image Captioning Systems. (2023)."},{"key":"e_1_3_2_1_49_1","unstructured":"Xu Zhao Wenchao Ding Yongqi An Yinglong Du Tao Yu Min Li Ming Tang and Jinqiao Wang. 2023. Fast Segment Anything. arXiv:2306.12156 [cs.CV]"},{"key":"e_1_3_2_1_50_1","unstructured":"Xingyi Zhou Dequan Wang and Philipp Kr\u00e4henb\u00fchl. 2019. Objects as Points. In arXiv preprint arXiv:1904.07850."}],"event":{"name":"MM '25: The 33rd ACM International Conference on Multimedia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Dublin Ireland","acronym":"MM '25"},"container-title":["Proceedings of the 33rd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746027.3755016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T19:19:37Z","timestamp":1765307977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746027.3755016"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":50,"alternative-id":["10.1145\/3746027.3755016","10.1145\/3746027"],"URL":"https:\/\/doi.org\/10.1145\/3746027.3755016","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}