{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T10:47:02Z","timestamp":1762080422521,"version":"build-2065373602"},"reference-count":35,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2022,12,8]],"date-time":"2022-12-08T00:00:00Z","timestamp":1670457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"State Administration of Science, Technology and Industry for National Defense","award":["JCKY2021206B102"],"award-info":[{"award-number":["JCKY2021206B102"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>Small perturbations can make deep models fail. Since deep models are widely used in face recognition systems (FRS) such as surveillance and access control, adversarial examples may introduce more subtle threats to face recognition systems. In this paper, we propose a practical white-box adversarial attack method. The method can automatically form a local area with key semantics on the face. The shape of the local area generated by the algorithm varies according to the environment and light of the character. Since these regions contain major facial features, we generated patch-like adversarial examples based on this region, which can effectively deceive FRS. The algorithm introduced the momentum parameter to stabilize the optimization directions. We accelerated the generation process by increasing the learning rate in segments. Compared with the traditional adversarial algorithm, our algorithms are very inconspicuous, which is very suitable for application in real scenes. The attack was verified on the CASIA WebFace and LFW datasets which were also proved to have good transferability.<\/jats:p>","DOI":"10.3390\/a15120465","type":"journal-article","created":{"date-parts":[[2022,12,8]],"date-time":"2022-12-08T02:51:56Z","timestamp":1670467916000},"page":"465","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Momentum-Based Local Face Adversarial Example Generation Algorithm"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7536-9764","authenticated-orcid":false,"given":"Dapeng","family":"Lang","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Harbin University of Science and Technology, Harbin 150080, China"},{"name":"College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China"}]},{"given":"Deyun","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin University of Science and Technology, Harbin 150080, China"}]},{"given":"Jinjie","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin University of Science and Technology, Harbin 150080, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6557-262X","authenticated-orcid":false,"given":"Sizhao","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,12,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Taigman, Y., Yang, M., Ranzato, M.A., and Wolf, L. (2014, January 23\u201328). DeepFace: Closing the gap to human-level performance in face verification. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, USA.","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Taigman, Y., Yang, M., Ranzato, M.A., and Wolf, L. (2015, January 7\u201312). Web-scale training for face identification. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Boston, MA, USA.","DOI":"10.1109\/CVPR.2015.7298891"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., and Zafeiriou, S. (2019, January 16\u201320). Arcface: Additive angular margin loss for deep face recognition. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Long Beach, CA, USA.","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Wang, H., Wang, Y., Zhou, Z., Ji, X., Gong, D., Zhou, J., Li, Z., and Liu, W. (2018, January 18\u201322). Cosface: Large margin cosine loss for deep face recognition. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA.","DOI":"10.1109\/CVPR.2018.00552"},{"key":"ref_5","unstructured":"Florian, S., Kalenichenko, D., and Philbin, J. (2015, January 7\u201312). Facenet: A unified embedding for face recognition and clustering. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Boston, MA, USA."},{"key":"ref_6","unstructured":"Tianyue, Z., Deng, W., and Hu, J. (2017). Cross-age lfw: A database for studying cross-age face recognition in unconstrained environments. arXiv."},{"key":"ref_7","unstructured":"Yi, D., Lei, Z., Liao, S., and Li, S.Z. (2014). Learning Face Representation from Scratch. arXiv."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Chen, S., Liu, Y., Gao, X., and Han, Z. (2018, January 3\u20134). MobileFaceNets: Efficient CNNs for Accurate Real-time Face Verification on Mobile Devices. Proceedings of the Chinese Conference on Biometric Recognition, Beijing, China.","DOI":"10.1007\/978-3-319-97909-0_46"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Thys, S., Van Ranst, W., and Goedeme, T. (2019, January 16\u201317). Fooling automated surveillance cameras: Adversarial patches to attack person detection. Proceedings of the 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Long Beach, CA, USA.","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"ref_10","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., and Fergus, R. (2014). Intriguing properties of neural networks. arXiv."},{"key":"ref_11","unstructured":"Goodfellow, I.J., Shlens, J., and Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv, Available online: https:\/\/arxiv.org\/abs\/1412.6572."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Dong, Y., Liao, F., Pang, T., Su, H., Zhu, J., Hu, X., and Li, J. (2018, January 18\u201322). Boosting Adversarial Attacks with Momentum. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA.","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Carlini, N., and Wagner, D.A. (2017, January 22\u201326). Towards Evaluating the Robustness of Neural Networks. Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA.","DOI":"10.1109\/SP.2017.49"},{"key":"ref_14","unstructured":"Liu, X., Yang, H., Liu, Z., Song, L., Chen, Y., and Li, H. (2019). DPATCH: An Adversarial Patch Attack on Object Detectors. arXiv."},{"key":"ref_15","unstructured":"Kevin, E., Ivan, E., Earlence, F., Bo, L., Amir, R., Florian, T., Atul, P., Tadayoshi, K., and Dawn, S. (2018). Physical Adversarial Examples for Object Detectors. arXiv."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Wu, Z., Lim, S., Davis, L., and Goldstein, T. (2020, January 23\u201328). Making an Invisibility Cloak: Real World Adversarial Attacks on Object Detectors. Proceedings of the 16th European Conference on Computer Vision, Glasgow, UK.","DOI":"10.1007\/978-3-030-58548-8_1"},{"key":"ref_17","unstructured":"Xu, K., Zhang, G., Liu, S., Fan, Q., Sun, M., Chen, H., Chen, P., Wang, Y., and Lin, X. (2019). Evading Real-Time Person Detectors by Adversarial T-shirt. arXiv."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., and Reiter, M.K. (2016, January 24\u201328). Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition. Proceedings of the CCS\u201916: 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria.","DOI":"10.1145\/2976749.2978392"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Komkov, S., and Petiushko, A. (2021, January 10\u201315). AdvHat: Real-world adversarial attack on ArcFace Face ID system. Proceedings of the 2020 25th International Conference on Pattern Recognition (ICPR), Milan, Italy.","DOI":"10.1109\/ICPR48806.2021.9412236"},{"key":"ref_20","unstructured":"Huang, G.B., Mattar, M., Berg, T., and Learned-Miller, E. (2008, January 17). Labeled faces in the wild: A database for studying face recognition in unconstrained environments. Proceedings of the Workshop on Faces in \u2018Real-Life\u2019 Images: Detection, Alignment, and Recognition, Marseille, France."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Liu, W., Wen, Y., Yu, Z., Li, M., Raj, B., and Song, L. (2017, January 21\u201326). Sphereface: Deep hypersphere embedding for face recognition. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.713"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"6637936:1","DOI":"10.1155\/2021\/6637936","article-title":"Attention-Guided Digital Adversarial Patches On Visual Detection","volume":"2021","author":"Lang","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_23","unstructured":"Nguyen, D., Arora, S.S., Wu, Y., and Yang, H. (2022, October 23). Adversarial Light Projection Attacks on Face Recognition Systems: A Feasibility Study. Available online: https:\/\/arxiv.org\/abs\/2003.11145."},{"key":"ref_24","unstructured":"Ioffe, S., and Szegedy, C. (2015, January 6\u201311). Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. Proceedings of the International Conference on Machine Learning, Lille, France."},{"key":"ref_25","unstructured":"Zolfi, A., Avidan, S., Elovici, Y., and Shabtai, A. (2021). Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models. arXiv."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Yin, B., Wang, W., Yao, T., Guo, J., Kong, Z., Ding, S., Li, J., and Liu, C. (2021, January 19\u201327). Adv-Makeup\u2014A New Imperceptible and Transferable Attack on Face Recognition. Proceedings of the International Joint Conference on Artificial Intelligence, Montreal, QC, Canada.","DOI":"10.24963\/ijcai.2021\/173"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Xiao, Z., Gao, X., Fu, C., Dong, Y., Gao, W., Zhang, X., Zhou, J., and Zhu, J. (2021, January 19\u201325). Improving transferability of adversarial patches on face recognition with generative models. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Virtual.","DOI":"10.1109\/CVPR46437.2021.01167"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Parmar, R., Kuribayashi, M., Takiwaki, H., and Raval, M.S. (2022, January 18\u201323). On Fooling Facial Recognition Systems using Adversarial Patches. Proceedings of the 2022 International Joint Conference on Neural Networks, Padova, Italy.","DOI":"10.1109\/IJCNN55064.2022.9892071"},{"key":"ref_29","unstructured":"Jia, S., Yin, B., Yao, T., Ding, S., Shen, C., Yang, X., and Ma, C. (2022). Adv-Attribute: Inconspicuous and Transferable Adversarial Attack on Face Recognition. arXiv."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","article-title":"Joint face detection and alignment using multitask cascaded convolutional networks","volume":"23","author":"Zhang","year":"2016","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Farfade, S.S., Saberian, M.J., and Li, L.J. (2015, January 23\u201326). Multi-view Face Detection Using Deep Convolutional Neural Networks. Proceedings of the 5th ACM on International Conference on Multimedia Retrieval, Shanghai, China.","DOI":"10.1145\/2671188.2749408"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., and Sun, J. (2016, January 27\u201330). Deep residual learning for image recognition. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Hu, J., Shen, L., and Sun, G. (2018, January 18\u201323). Squeeze-and-excitation networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA.","DOI":"10.1109\/CVPR.2018.00745"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1049\/el:20080522","article-title":"Scope of validity of PSNR in image\/video quality assessment","volume":"44","author":"Ghanbari","year":"2008","journal-title":"Electron. Lett."},{"key":"ref_35","first-page":"1","article-title":"xCos: An Explainable Cosine Metric for Face Verification Task. ACM Trans","volume":"17","author":"Lin","year":"2021","journal-title":"Multimed. Comput. Commun. Appl."}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/15\/12\/465\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:36:07Z","timestamp":1760146567000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/15\/12\/465"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,8]]},"references-count":35,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["a15120465"],"URL":"https:\/\/doi.org\/10.3390\/a15120465","relation":{},"ISSN":["1999-4893"],"issn-type":[{"type":"electronic","value":"1999-4893"}],"subject":[],"published":{"date-parts":[[2022,12,8]]}}}