{"id":"https://openalex.org/W4410101362","doi":"https://doi.org/10.1007/s11063-025-11756-8","title":"Lights, Camera, Adversary: Decoding the Enigmatic World of Malicious Frames in Real-Time Video Surveillance Systems","display_name":"Lights, Camera, Adversary: Decoding the Enigmatic World of Malicious Frames in Real-Time Video Surveillance Systems","publication_year":2025,"publication_date":"2025-05-05","ids":{"openalex":"https://openalex.org/W4410101362","doi":"https://doi.org/10.1007/s11063-025-11756-8"},"language":"en","primary_location":{"id":"doi:10.1007/s11063-025-11756-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11063-025-11756-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11063-025-11756-8.pdf","source":{"id":"https://openalex.org/S140962798","display_name":"Neural Processing Letters","issn_l":"1370-4621","issn":["1370-4621","1573-773X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Neural Processing Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s11063-025-11756-8.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073737017","display_name":"Sheikh Burhan Ul Haque","orcid":"https://orcid.org/0000-0003-3306-5671"},"institutions":[{"id":"https://openalex.org/I4210099876","display_name":"Cluster University Srinagar","ror":"https://ror.org/0127tex41","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210099876"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Burhan ul Haque Sheikh","raw_affiliation_strings":["Department of Computer Application, Cluster university, Srinagar, Jammu and kashmir, 190008, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Application, Cluster university, Srinagar, Jammu and kashmir, 190008, India","institution_ids":["https://openalex.org/I4210099876"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047605719","display_name":"Aasim Zafar","orcid":"https://orcid.org/0000-0003-1331-014X"},"institutions":[{"id":"https://openalex.org/I171210897","display_name":"Aligarh Muslim University","ror":"https://ror.org/03kw9gc02","country_code":"IN","type":"education","lineage":["https://openalex.org/I171210897"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Aasim Zafar","raw_affiliation_strings":["Department of Computer Science, Aligarh Muslim University, Aligarh, Uttar Pradesh, 202002, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Aligarh Muslim University, Aligarh, Uttar Pradesh, 202002, India","institution_ids":["https://openalex.org/I171210897"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5073737017"],"corresponding_institution_ids":["https://openalex.org/I4210099876"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":{"value":2390,"currency":"EUR","value_usd":2990},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04455284,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"57","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.6757315993309021},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6692715287208557},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6471490859985352},{"id":"https://openalex.org/keywords/computational-intelligence","display_name":"Computational intelligence","score":0.5698627233505249},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49482983350753784},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.42079830169677734},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3915277123451233},{"id":"https://openalex.org/keywords/computer-graphics","display_name":"Computer graphics (images)","score":0.3286657929420471},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1399088203907013}],"concepts":[{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.6757315993309021},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6692715287208557},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6471490859985352},{"id":"https://openalex.org/C139502532","wikidata":"https://www.wikidata.org/wiki/Q1122090","display_name":"Computational intelligence","level":2,"score":0.5698627233505249},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49482983350753784},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.42079830169677734},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3915277123451233},{"id":"https://openalex.org/C121684516","wikidata":"https://www.wikidata.org/wiki/Q7600677","display_name":"Computer graphics (images)","level":1,"score":0.3286657929420471},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1399088203907013}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11063-025-11756-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11063-025-11756-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11063-025-11756-8.pdf","source":{"id":"https://openalex.org/S140962798","display_name":"Neural Processing Letters","issn_l":"1370-4621","issn":["1370-4621","1573-773X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Neural Processing Letters","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s11063-025-11756-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11063-025-11756-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11063-025-11756-8.pdf","source":{"id":"https://openalex.org/S140962798","display_name":"Neural Processing Letters","issn_l":"1370-4621","issn":["1370-4621","1573-773X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Neural Processing Letters","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4410101362.pdf","grobid_xml":"https://content.openalex.org/works/W4410101362.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W2108598243","https://openalex.org/W2341528187","https://openalex.org/W2534300788","https://openalex.org/W2543927648","https://openalex.org/W2746600820","https://openalex.org/W2809943552","https://openalex.org/W2921424288","https://openalex.org/W2947129602","https://openalex.org/W2962818281","https://openalex.org/W2962917037","https://openalex.org/W2963542245","https://openalex.org/W2963726920","https://openalex.org/W2963857521","https://openalex.org/W3021182036","https://openalex.org/W3101998545","https://openalex.org/W3106412272","https://openalex.org/W3111611853","https://openalex.org/W3192689066","https://openalex.org/W3196324719","https://openalex.org/W4283381883","https://openalex.org/W4285809410","https://openalex.org/W4313216104","https://openalex.org/W4319777741","https://openalex.org/W4320016138","https://openalex.org/W4360998009","https://openalex.org/W4385738815","https://openalex.org/W4387741691","https://openalex.org/W4390177026","https://openalex.org/W4390705752","https://openalex.org/W4391217080","https://openalex.org/W4399992264","https://openalex.org/W6602625421","https://openalex.org/W6604344240"],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W4242235492","https://openalex.org/W4237162029","https://openalex.org/W2367268135","https://openalex.org/W2385701518","https://openalex.org/W4237464767","https://openalex.org/W4387985143","https://openalex.org/W4362599004","https://openalex.org/W2808242528","https://openalex.org/W1567638270"],"abstract_inverted_index":{"Surveillance":[0],"systems":[1,32,194,208],"play":[2],"a":[3,82,104,158],"vital":[4],"role":[5],"in":[6,30,211],"ensuring":[7],"public":[8],"safety":[9],"by":[10],"detecting":[11],"criminal":[12],"activity,":[13],"managing":[14],"traffic,":[15],"and":[16,22,37,53,123,172,182],"more.":[17],"Nowadays,":[18],"deep":[19],"learning":[20,24],"(DL)":[21],"machine":[23],"(ML)":[25],"techniques":[26],"are":[27,55,209],"widely":[28],"used":[29],"these":[31,207],"to":[33,57,65,91,103,177,195],"enhance":[34],"their":[35],"accuracy":[36,173],"efficiency.":[38],"However,":[39],"recent":[40],"studies":[41],"have":[42],"shown":[43],"that":[44],"artificial":[45],"intelligence":[46],"(AI)-based":[47],"systems,":[48],"particularly":[49],"those":[50],"using":[51],"ML":[52],"DL,":[54],"vulnerable":[56],"adversarial":[58,86,135,151,196],"attacks,":[59],"which":[60],"can":[61,88,137],"cause":[62],"the":[63,147,150,154,188,199],"model":[64],"make":[66],"incorrect":[67],"decisions.":[68],"These":[69],"attacks":[70,87,136],"were":[71],"originally":[72],"designed":[73],"for":[74,120,125,140,202],"image":[75],"models.":[76],"In":[77],"this":[78],"study,":[79],"we":[80,99],"propose":[81],"new":[83],"approach":[84],"where":[85],"be":[89,138],"extended":[90],"real-time":[92,105,141],"video":[93,192],"surveillance":[94,142,193],"systems.":[95,143],"To":[96],"demonstrate":[97],"this,":[98],"applied":[100],"our":[101],"method":[102],"face":[106,121,126],"mask":[107,127],"detection":[108,122],"system.":[109],"The":[110],"system":[111],"is":[112],"based":[113],"on":[114],"Multi-Task":[115],"Cascaded":[116],"Convolutional":[117],"Networks":[118],"(MTCNN)":[119],"MobileNet-v2":[124],"classification.":[128],"Our":[129],"pioneering":[130],"framework":[131],"shows":[132],"how":[133],"state-of-the-art":[134],"adapted":[139],"Experimental":[144],"results":[145],"show":[146],"impact":[148],"of":[149,161,165,170,175,190],"attack,":[152],"reducing":[153],"model\u2019s":[155],"performance":[156],"from":[157],"precision":[159],"(P)":[160],"0.93,":[162,166,171],"recall":[163],"(R)":[164],"F1":[167],"score":[168],"(F)":[169],"(A)":[174],"0.93":[176],"just":[178],"0.22,":[179,181,183],"0.21,":[180],"respectively.":[184],"This":[185],"research":[186],"highlights":[187],"vulnerabilities":[189],"critical":[191],"threats,":[197],"emphasizing":[198],"urgent":[200],"need":[201],"strong":[203],"defense":[204],"mechanisms":[205],"before":[206],"deployed":[210],"real-world":[212],"scenarios.":[213]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
