{"id":"https://openalex.org/W3119160191","doi":"https://doi.org/10.1109/ijcb48548.2020.9304864","title":"Is Face Recognition Safe from Realizable Attacks?","display_name":"Is Face Recognition Safe from Realizable Attacks?","publication_year":2020,"publication_date":"2020-09-28","ids":{"openalex":"https://openalex.org/W3119160191","doi":"https://doi.org/10.1109/ijcb48548.2020.9304864","mag":"3119160191"},"language":"en","primary_location":{"id":"doi:10.1109/ijcb48548.2020.9304864","is_oa":false,"landing_page_url":"http://doi.org/10.1109/ijcb48548.2020.9304864","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Joint Conference on Biometrics (IJCB)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2210.08178","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114112373","display_name":"Sanjay Saha","orcid":"https://orcid.org/0009-0003-5386-0768"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Sanjay Saha","raw_affiliation_strings":["Department of Computer Science National University of Singapore"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science National University of Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065478753","display_name":"Terence Sim","orcid":"https://orcid.org/0000-0002-0198-094X"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Terence Sim","raw_affiliation_strings":["Department of Computer Science National University of Singapore"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science National University of Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5114112373"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":0.4114,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.71284247,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"4","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12268","display_name":"Deception detection and forensic psychology","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6970926523208618},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.6933127641677856},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.6346226930618286},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42400991916656494},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.4063184857368469},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3777802884578705},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.33984261751174927},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.2831869125366211}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6970926523208618},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.6933127641677856},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.6346226930618286},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42400991916656494},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.4063184857368469},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3777802884578705},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.33984261751174927},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2831869125366211},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ijcb48548.2020.9304864","is_oa":false,"landing_page_url":"http://doi.org/10.1109/ijcb48548.2020.9304864","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Joint Conference on Biometrics (IJCB)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2210.08178","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2210.08178","pdf_url":"https://arxiv.org/pdf/2210.08178","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2210.08178","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2210.08178","pdf_url":"https://arxiv.org/pdf/2210.08178","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W1609438213","https://openalex.org/W1673923490","https://openalex.org/W1945616565","https://openalex.org/W2073942619","https://openalex.org/W2140355387","https://openalex.org/W2194775991","https://openalex.org/W2325939864","https://openalex.org/W2460937040","https://openalex.org/W2535873859","https://openalex.org/W2602244503","https://openalex.org/W2603766943","https://openalex.org/W2617529796","https://openalex.org/W2626352995","https://openalex.org/W2736899637","https://openalex.org/W2746600820","https://openalex.org/W2778540638","https://openalex.org/W2782017896","https://openalex.org/W2785486371","https://openalex.org/W2788741149","https://openalex.org/W2798801120","https://openalex.org/W2886610278","https://openalex.org/W2912990735","https://openalex.org/W2963062382","https://openalex.org/W2963070423","https://openalex.org/W2963207607","https://openalex.org/W2963557656","https://openalex.org/W2963694625","https://openalex.org/W2963767194","https://openalex.org/W2963979376","https://openalex.org/W2964153729","https://openalex.org/W2969536251","https://openalex.org/W2972986629","https://openalex.org/W3106412272","https://openalex.org/W4256551663","https://openalex.org/W4300511536","https://openalex.org/W6636603358","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6719080892","https://openalex.org/W6741036071","https://openalex.org/W6746608116","https://openalex.org/W6747374261","https://openalex.org/W6748918544","https://openalex.org/W6750404860","https://openalex.org/W6751839145"],"related_works":["https://openalex.org/W2755342338","https://openalex.org/W2779427294","https://openalex.org/W2775347418","https://openalex.org/W2625805835","https://openalex.org/W2079911747","https://openalex.org/W3116076068","https://openalex.org/W2069885731","https://openalex.org/W2563206327","https://openalex.org/W2108687567","https://openalex.org/W2384651879"],"abstract_inverted_index":{"Face":[0,26,127],"recognition":[1,92,113],"is":[2],"a":[3],"popular":[4],"form":[5],"of":[6,39,43],"biometric":[7],"authentication":[8],"and":[9,33,81,96],"due":[10],"to":[11,31,36,88],"its":[12],"widespread":[13],"use,":[14],"attacks":[15,32,45,109],"have":[16],"become":[17],"more":[18],"common":[19],"as":[20],"well.":[21],"Recent":[22],"studies":[23],"show":[24,98],"that":[25,56,84,99],"Recognition":[27,128],"Systems":[28,129],"are":[29,46,50,57],"vulnerable":[30],"can":[34,72,106],"lead":[35],"erroneous":[37],"identification":[38],"faces.":[40],"Interestingly,":[41],"most":[42],"these":[44],"white-box,":[47],"or":[48],"they":[49],"manipulating":[51],"facial":[52],"images":[53,77],"in":[54,115],"ways":[55],"not":[58],"physically":[59,82],"realizable.":[60],"In":[61],"this":[62],"paper,":[63],"we":[64],"propose":[65],"an":[66],"attack":[67,89],"scheme":[68],"where":[69],"the":[70,121,126],"attacker":[71],"generate":[73],"realistic":[74],"synthesized":[75],"face":[76,87,91,105,112],"with":[78],"subtle":[79,100],"perturbations":[80,101],"realize":[83],"onto":[85],"his":[86],"black-box":[90,116,132],"systems.":[93],"Comprehensive":[94],"experiments":[95],"analyses":[97],"realized":[102],"on":[103,110],"attackers":[104],"create":[107],"successful":[108],"state-of-the-art":[111],"systems":[114],"settings.":[117],"Our":[118],"study":[119],"exposes":[120],"underlying":[122],"vulnerability":[123],"posed":[124],"by":[125],"against":[130],"realizable":[131],"attacks.":[133]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
