{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T17:49:50Z","timestamp":1773942590999,"version":"3.50.1"},"reference-count":47,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T00:00:00Z","timestamp":1727308800000},"content-version":"vor","delay-in-days":269,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072055"],"award-info":[{"award-number":["62072055"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Intelligent Systems"],"published-print":{"date-parts":[[2024,1]]},"abstract":"<jats:p>Aiming at the shortcomings of the current face liveness detection attack methods in the low generation speed of adversarial examples and the implementation of white\u2010box attacks, a novel black\u2010box attack method for face liveness detection named as FLDATN is proposed based on adversarial transformation network (ATN). In FLDATN, a convolutional block attention module (CBAM) is used to improve the generalization ability of adversarial examples, and the misclassification loss function based on feature similarity is defined. Experiments and analysis on the Oulu\u2010NPU dataset show that the adversarial examples generated by the FLDATN have a good black\u2010box attack effect on the task of face liveness detection and can achieve better generalization performance than the traditional methods. In addition, since FLDATN does not need to perform multiple gradient calculations for each image, it can significantly improve the generation speed of the adversarial examples.<\/jats:p>","DOI":"10.1155\/2024\/8436216","type":"journal-article","created":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T15:59:56Z","timestamp":1727366396000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["FLDATN: Black\u2010Box Attack for Face Liveness Detection Based on Adversarial Transformation Network"],"prefix":"10.1155","volume":"2024","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-3751-1249","authenticated-orcid":false,"given":"Yali","family":"Peng","sequence":"first","affiliation":[]},{"given":"Jianbo","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1229-2317","authenticated-orcid":false,"given":"Min","family":"Long","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8053-4587","authenticated-orcid":false,"given":"Fei","family":"Peng","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2024,9,26]]},"reference":[{"key":"e_1_2_12_1_2","doi-asserted-by":"crossref","unstructured":"YuZ. ZhaoC. WangZ.et al. Searching Central Difference Convolutional Networks for Face Anti-Spoofing Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition June 2020 Seattle WA 5295\u20135305.","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"e_1_2_12_2_2","first-page":"641","volume-title":"European Conference on Computer Vision","author":"Zhang K.-Y.","year":"2020"},{"key":"e_1_2_12_3_2","doi-asserted-by":"crossref","unstructured":"SharifM. BhagavatulaS. BauerL. andReiterM. K. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security October 2016 Vienna Austria 1528\u20131540.","DOI":"10.1145\/2976749.2978392"},{"key":"e_1_2_12_4_2","doi-asserted-by":"crossref","unstructured":"WengerE. PassanantiJ. BhagojiA. N. YaoY. ZhengH. andZhaoB. Y. Backdoor Attacks Against Deep Learning Systems in the Physical World Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition June 2021 Seattle WA 6206\u20136215.","DOI":"10.1109\/CVPR46437.2021.00614"},{"key":"e_1_2_12_5_2","doi-asserted-by":"crossref","unstructured":"YinB. WangW. YaoT.et al. Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition 2021 https:\/\/arxiv.org\/abs\/2105.03162.","DOI":"10.24963\/ijcai.2021\/173"},{"key":"e_1_2_12_6_2","doi-asserted-by":"crossref","DOI":"10.1016\/j.cviu.2020.102988","article-title":"Adversarial Examples for Replay Attacks Against Cnn-Based Face Recognition With Anti-Spoofing Capability","volume":"197","author":"Zhang B.","year":"2020","journal-title":"Computer Vision and Image Understanding"},{"key":"e_1_2_12_7_2","doi-asserted-by":"crossref","unstructured":"BoulkenafetZ. KomulainenJ. andHadidA. Face Anti-Spoofing Based on Color Texture Analysis 2015 IEEE International Conference on Image Processing (ICIP) September 2015 Qu\u00e9bec City Canada IEEE 2636\u20132640.","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"e_1_2_12_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578288"},{"key":"e_1_2_12_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4780-0"},{"key":"e_1_2_12_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2322255"},{"key":"e_1_2_12_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2010.2086456"},{"key":"e_1_2_12_12_2","doi-asserted-by":"crossref","unstructured":"LiuS.-Q. LanX. andYuenP. C. Remote Photoplethysmography Correspondence Feature for 3d Mask Face Presentation Attack Detection Proceedings of the European Conference on Computer Vision (ECCV) September 2018 Munich Germany 558\u2013573.","DOI":"10.1007\/978-3-030-01270-0_34"},{"key":"e_1_2_12_13_2","doi-asserted-by":"crossref","unstructured":"LagorioA. TistarelliM. CadoniM. FookesC. andSridharanS. Liveness Detection Based on 3d Face Shape Analysis 2013 International Workshop on Biometrics and Forensics (IWBF) April 2013 Lisbon Portugal IEEE 1\u20134.","DOI":"10.1109\/IWBF.2013.6547310"},{"key":"e_1_2_12_14_2","doi-asserted-by":"crossref","first-page":"22 471","DOI":"10.3390\/s141222471","article-title":"Face Liveness Detection Using a Light Field Camera","volume":"14","author":"Kim S.","year":"2014","journal-title":"Sensors"},{"key":"e_1_2_12_15_2","doi-asserted-by":"crossref","unstructured":"XuZ. LiS. andDengW. Learning Temporal Features Using Lstm-Cnn Architecture for Face Anti-Spoofing 2015 3rd IAPR Asian Conference on Pattern Recognition (ACPR) November 2015 Kuala Lumpur Malaysia IEEE 141\u2013145.","DOI":"10.1109\/ACPR.2015.7486482"},{"key":"e_1_2_12_16_2","doi-asserted-by":"crossref","unstructured":"AtoumY. LiuY. JourablooA. andLiuX. Face Anti-Spoofing Using Patch and Depth-Based Cnns 2017 IEEE International Joint Conference on Biometrics (IJCB) October 2017 Denver CO IEEE 319\u2013328.","DOI":"10.1109\/BTAS.2017.8272713"},{"key":"e_1_2_12_17_2","doi-asserted-by":"crossref","unstructured":"LiuY. JourablooA. andLiuX. Learning Deep Models for Face Anti-Spoofing: Binary or Auxiliary Supervision Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition June 2018 Boston MA 389\u2013398.","DOI":"10.1109\/CVPR.2018.00048"},{"key":"e_1_2_12_18_2","doi-asserted-by":"crossref","unstructured":"WangC. LuY. YangS. andLaiS. Patchnet: A Simple Face Anti-Spoofing Framework via Fine-Grained Patch Recognition Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition June 2022 Vancouver Canada 20281\u201320290.","DOI":"10.1109\/CVPR52688.2022.01964"},{"key":"e_1_2_12_19_2","doi-asserted-by":"crossref","first-page":"4775","DOI":"10.1109\/TIFS.2023.3296330","article-title":"FM-VIT: Flexible Modal Vision Transformers for Face Anti-Spoofing","volume":"18","author":"Liu A.","year":"2023","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_2_12_20_2","doi-asserted-by":"crossref","unstructured":"LiuA. XueS. GanJ.et al. CFPL-FAS: Class Free Prompt Learning for Generalizable Face Anti-Spoofing Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition June 2024 Seattle WA 222\u2013232.","DOI":"10.1109\/CVPR52733.2024.00029"},{"key":"e_1_2_12_21_2","unstructured":"GoodfellowI. J. ShlensJ. andSzegedyC. Explaining and Harnessing Adversarial Examples 2014 https:\/\/arxiv.org\/abs\/1412.6572."},{"key":"e_1_2_12_22_2","unstructured":"KurakinA. GoodfellowI. BengioS.et al. Adversarial Examples in the Physical World 2016 https:\/\/arxiv.org\/abs\/1607.02533."},{"key":"e_1_2_12_23_2","unstructured":"MadryA. MakelovA. SchmidtL. TsiprasD. andVladuA. Towards Deep Learning Models Resistant to Adversarial Attacks 2017 https:\/\/arxiv.org\/abs\/1706.06083."},{"key":"e_1_2_12_24_2","doi-asserted-by":"crossref","unstructured":"CarliniN.andWagnerD. Towards Evaluating the Robustness of Neural Networks 2017 IEEE Symposium on Security and Privacy (SP) May 2017 San Jose CA IEEE 39\u201357.","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_2_12_25_2","doi-asserted-by":"crossref","first-page":"9572","DOI":"10.1109\/TMM.2023.3255742","article-title":"Average Gradient-Based Adversarial Attack","volume":"25","author":"Wan C.","year":"2023","journal-title":"IEEE Transactions on Multimedia"},{"key":"e_1_2_12_26_2","unstructured":"MoosaviS.-M. FawziA. FawziO. andFrossardP. Universal Adversarial Perturbations Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition July 2017 Honolulu HI 1765\u20131773."},{"key":"e_1_2_12_27_2","unstructured":"BalujaS.andFischerI. Adversarial Transformation Networks: Learning to Generate Adversarial Examples 2017 https:\/\/arxiv.org\/abs\/1703.09387."},{"key":"e_1_2_12_28_2","unstructured":"XiaoC. LiB. ZhuJ.-Y. HeW. LiuM. andSongD. Generating Adversarial Examples With Adversarial Networks 2018 https:\/\/arxiv.org\/abs\/1801.02610."},{"key":"e_1_2_12_29_2","doi-asserted-by":"crossref","unstructured":"JandialS. ManglaP. VarshneyS. andBalasubramanianV. Advgan++: Harnessing Latent Layers for Adversary Generation Proceedings of the IEEE\/CVF International Conference on Computer Vision Workshops June 2019 Salt Lake City UT.","DOI":"10.1109\/ICCVW.2019.00257"},{"key":"e_1_2_12_30_2","doi-asserted-by":"crossref","unstructured":"LiuX.andHsiehC.-J. Rob-gan: Generator Discriminator and Adversarial Attacker Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition June 2019 Long Beach CA 11234\u201311243.","DOI":"10.1109\/CVPR.2019.01149"},{"key":"e_1_2_12_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03469-5"},{"key":"e_1_2_12_32_2","doi-asserted-by":"crossref","unstructured":"BoseA. J.andAarabiP. Adversarial Attacks on Face Detectors Using Neural Net Based Constrained Optimization 2018 IEEE 20th Inter-National Workshop on Multimedia Signal Processing (MMSP) August 2018 Vancouver Canada IEEE 1\u20136.","DOI":"10.1109\/MMSP.2018.8547128"},{"key":"e_1_2_12_33_2","article-title":"Faster R-Cnn: Towards Real-Time Object Detection With Region Proposal Networks","volume":"28","author":"Ren S.","year":"2015","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_2_12_34_2","doi-asserted-by":"crossref","unstructured":"DebD. ZhangJ. andJainA. K. Advfaces: Adversarial Face Synthesis 2020 IEEE International Joint Conference on Biometrics (IJCB) July 2020 Houston TX IEEE 1\u201310.","DOI":"10.1109\/IJCB48548.2020.9304898"},{"key":"e_1_2_12_35_2","doi-asserted-by":"crossref","unstructured":"PatnaikS. A. ChansoriyaS. NamboodiriA. M. andJainA. K. AdvGen: Physical Adversarial Attack on Face Presentation Attack Detection Systems Proceedings of IEEE International Joint Conference on Biometrics September 2023 Ljubljana Slovenia 1\u201310.","DOI":"10.1109\/IJCB57857.2023.10448525"},{"key":"e_1_2_12_36_2","doi-asserted-by":"crossref","unstructured":"WooS. ParkJ. LeeJ.-Y. andKweonI. S. CBAM: Convolutional Block Attention Module Proceedings of the European Conference on Computer Vision (ECCV) September 2018 Munich Germany 3\u201319.","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"e_1_2_12_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"e_1_2_12_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"e_1_2_12_39_2","doi-asserted-by":"crossref","unstructured":"SchroffF. KalenichenkoD. andPhilbinJ. Facenet: A Unified Embedding for Face Recognition and Clustering Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition June 2015 Boston MA 815\u2013823.","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_2_12_40_2","doi-asserted-by":"crossref","unstructured":"BoulkenafetZ. KomulainenJ. LiL. FengX. andHadidA. Oulu-npu: A Mobile Face Presentation Attack Database With Real-World Variations 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017) May 2017 Washington DC DC IEEE 612\u2013618.","DOI":"10.1109\/FG.2017.77"},{"key":"e_1_2_12_41_2","doi-asserted-by":"crossref","unstructured":"HeK. ZhangX. RenS. andSunJ. Deep Residual Learning for Image Recognition Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition June 2016 Las Vegas NV 770\u2013778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_2_12_42_2","unstructured":"HowardA. G. ZhuM. ChenB.et al. Mobilenets: Efficient Convolutional Neural Networks for Mobile Vision Applications 2017 https:\/\/arxiv.org\/abs\/1704.04861."},{"key":"e_1_2_12_43_2","doi-asserted-by":"crossref","unstructured":"HuangG. LiuZ. Van Der MaatenL. andWeinbergerK. Q. Densely Connected Convolutional Networks Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition July 2017 Honolulu HI 4700\u20134708.","DOI":"10.1109\/CVPR.2017.243"},{"key":"e_1_2_12_44_2","unstructured":"SimonyanK.andZissermanA. Very Deep Convolutional Networks for Large-Scale Image Recognition 2014 https:\/\/arxiv.org\/abs\/1409.1556."},{"key":"e_1_2_12_45_2","unstructured":"TanM.andLeQ. Efficientnet: Rethinking Model Scaling for Convolutional Neural Networks International Conference on Machine Learning June 2019 Long Beach CA PMLR 6105\u20136114."},{"key":"e_1_2_12_46_2","unstructured":"DosovitskiyA. BeyerL. KolesnikovA.et al. An Image is Worth 16\u2009\u00d7\u200916 Words: Transformers for Image Recognition at Scale 2020 https:\/\/arxiv.org\/abs\/2010.11929."},{"key":"e_1_2_12_47_2","unstructured":"WightmanR. Pytorch Image Models 2019 https:\/\/github.com\/rwightman\/pytorch-image-models."}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2024\/8436216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T16:00:13Z","timestamp":1727366413000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2024\/8436216"}},"subtitle":[],"editor":[{"given":"Beijing","family":"Chen","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":47,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["10.1155\/2024\/8436216"],"URL":"https:\/\/doi.org\/10.1155\/2024\/8436216","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1]]},"assertion":[{"value":"2024-06-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-27","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8436216"}}