{"id":"https://openalex.org/W4386131909","doi":"https://doi.org/10.1109/lsp.2023.3308012","title":"Adversarial Thumbnail-Preserving Transformation for Facial Images Based on GAN","display_name":"Adversarial Thumbnail-Preserving Transformation for Facial Images Based on GAN","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4386131909","doi":"https://doi.org/10.1109/lsp.2023.3308012"},"language":"en","primary_location":{"id":"doi:10.1109/lsp.2023.3308012","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2023.3308012","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101423381","display_name":"Wentao Zhou","orcid":"https://orcid.org/0009-0002-4979-9696"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wentao Zhou","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085698418","display_name":"Yushu Zhang","orcid":"https://orcid.org/0000-0001-8183-8435"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yushu Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007599604","display_name":"Ruoyu Zhao","orcid":"https://orcid.org/0000-0003-3631-1890"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruoyu Zhao","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101521505","display_name":"Shuang Yi","orcid":"https://orcid.org/0000-0001-9499-1033"},"institutions":[{"id":"https://openalex.org/I1313079697","display_name":"Southwest University of Political Science & Law","ror":"https://ror.org/02pz16m08","country_code":"CN","type":"education","lineage":["https://openalex.org/I1313079697"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuang Yi","raw_affiliation_strings":["Criminal Investigation School, Southwest University of Political Science and Law, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"Criminal Investigation School, Southwest University of Political Science and Law, Chongqing, China","institution_ids":["https://openalex.org/I1313079697"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045514825","display_name":"Rushi Lan","orcid":"https://orcid.org/0000-0002-9488-8236"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rushi Lan","raw_affiliation_strings":["Guangxi Key Laboratory of Image and Graphic Intelligent Processing, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Image and Graphic Intelligent Processing, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101423381"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":1.7265,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.86874657,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"30","issue":null,"first_page":"1147","last_page":"1151"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/thumbnail","display_name":"Thumbnail","score":0.9291556477546692},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8113075494766235},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.670123815536499},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.6127455830574036},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.5852141380310059},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.5441449880599976},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5275534987449646},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4903116524219513},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.46223267912864685},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45670175552368164},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4056788980960846},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3966566324234009},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.2992395758628845},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.23715591430664062},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.22438174486160278},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10935017466545105}],"concepts":[{"id":"https://openalex.org/C160174412","wikidata":"https://www.wikidata.org/wiki/Q873806","display_name":"Thumbnail","level":3,"score":0.9291556477546692},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8113075494766235},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.670123815536499},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.6127455830574036},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.5852141380310059},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.5441449880599976},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5275534987449646},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4903116524219513},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.46223267912864685},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45670175552368164},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4056788980960846},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3966566324234009},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2992395758628845},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.23715591430664062},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.22438174486160278},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10935017466545105},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lsp.2023.3308012","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2023.3308012","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7900000214576721,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G526554915","display_name":null,"funder_award_id":"62072237","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G943933891","display_name":null,"funder_award_id":"62002301","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1834627138","https://openalex.org/W2028299542","https://openalex.org/W2087681821","https://openalex.org/W2096733369","https://openalex.org/W2766866342","https://openalex.org/W2891817692","https://openalex.org/W2941048077","https://openalex.org/W2962793481","https://openalex.org/W2963073614","https://openalex.org/W2969985801","https://openalex.org/W3000450663","https://openalex.org/W3118245404","https://openalex.org/W3126792067","https://openalex.org/W3141913087","https://openalex.org/W4225758314","https://openalex.org/W4226094323","https://openalex.org/W4290943226","https://openalex.org/W4292387280","https://openalex.org/W4296871889","https://openalex.org/W4366492959"],"related_works":["https://openalex.org/W2011506639","https://openalex.org/W137154299","https://openalex.org/W2095080241","https://openalex.org/W2353159507","https://openalex.org/W3042973114","https://openalex.org/W2373789653","https://openalex.org/W2946255556","https://openalex.org/W1996899447","https://openalex.org/W3202072339","https://openalex.org/W2621974100"],"abstract_inverted_index":{"People":[0],"are":[1],"used":[2],"to":[3,13,25,37,62,82,151],"capturing":[4],"their":[5],"daily":[6],"lives":[7],"with":[8,156],"images":[9],"and":[10,29,58,68,85,131],"uploading":[11],"them":[12],"the":[14,53,64,73,87,90,95,105,108,144],"cloud":[15,20,56],"for":[16,47,70,122],"easy":[17],"archiving.":[18],"While":[19],"storage":[21,57],"services":[22],"bring":[23],"convenience":[24],"users,":[26],"malicious":[27],"humans":[28,67],"artificial":[30],"intelligence":[31],"machines":[32],"may":[33],"pose":[34],"privacy":[35,49,65,130],"threats":[36,50],"these":[38],"uploaded":[39],"images.":[40,111],"Thumbnail-preserving":[41],"encryption":[42],"(TPE)":[43],"is":[44,60,93],"a":[45,148],"solution":[46],"handling":[48],"posed":[51],"by":[52],"usage":[54],"of":[55,89],"it":[59],"able":[61],"balance":[63,129],"against":[66],"usability":[69,132],"users.":[71],"However,":[72],"present":[74],"TPE":[75],"schemes":[76],"display":[77],"certain":[78],"vulnerabilities":[79],"when":[80,86],"subjected":[81],"machine-based":[83],"attacks":[84],"size":[88],"thumbnail":[91],"block":[92],"small,":[94],"facial":[96,110,123],"recognition":[97,136,154],"(FR)":[98],"models":[99],"exhibit":[100],"strong":[101],"capability":[102],"in":[103],"recognizing":[104],"identity":[106],"within":[107],"protected":[109],"To":[112],"this":[113],"end,":[114],"we":[115],"propose":[116],"an":[117],"adversarial":[118],"thumbnail-preserving":[119],"transform":[120],"scheme":[121,146],"images,":[124],"which":[125],"can":[126],"not":[127],"only":[128],"but":[133],"also":[134],"resist":[135,152],"from":[137],"FR":[138],"models.":[139],"The":[140],"experiments":[141],"demonstrate":[142],"that":[143],"proposed":[145],"has":[147],"better":[149],"ability":[150],"machine":[153],"compared":[155],"existing":[157],"schemes.":[158]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":7}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
