{"id":"https://openalex.org/W4396982245","doi":"https://doi.org/10.1109/tifs.2024.3402167","title":"Toward Transferable Attack via Adversarial Diffusion in Face Recognition","display_name":"Toward Transferable Attack via Adversarial Diffusion in Face Recognition","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4396982245","doi":"https://doi.org/10.1109/tifs.2024.3402167"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3402167","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3402167","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055922843","display_name":"Cong Hu","orcid":"https://orcid.org/0000-0001-8473-077X"},"institutions":[{"id":"https://openalex.org/I111599522","display_name":"Jiangnan University","ror":"https://ror.org/04mkzax54","country_code":"CN","type":"education","lineage":["https://openalex.org/I111599522"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Cong Hu","raw_affiliation_strings":["School of Artificial Intelligence and Computer Science and Jiangsu Provincial Laboratory of Pattern Recognition and Computational Intelligence, Jiangnan University, Wuxi, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence and Computer Science and Jiangsu Provincial Laboratory of Pattern Recognition and Computational Intelligence, Jiangnan University, Wuxi, Jiangsu, China","institution_ids":["https://openalex.org/I111599522"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046728960","display_name":"Yuanbo Li","orcid":"https://orcid.org/0000-0002-0731-8885"},"institutions":[{"id":"https://openalex.org/I111599522","display_name":"Jiangnan University","ror":"https://ror.org/04mkzax54","country_code":"CN","type":"education","lineage":["https://openalex.org/I111599522"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanbo Li","raw_affiliation_strings":["School of Artificial Intelligence and Computer Science and Jiangsu Provincial Laboratory of Pattern Recognition and Computational Intelligence, Jiangnan University, Wuxi, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence and Computer Science and Jiangsu Provincial Laboratory of Pattern Recognition and Computational Intelligence, Jiangnan University, Wuxi, Jiangsu, China","institution_ids":["https://openalex.org/I111599522"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025299678","display_name":"Zhenhua Feng","orcid":"https://orcid.org/0000-0002-4485-4249"},"institutions":[{"id":"https://openalex.org/I28290843","display_name":"University of Surrey","ror":"https://ror.org/00ks66431","country_code":"GB","type":"education","lineage":["https://openalex.org/I28290843"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Zhenhua Feng","raw_affiliation_strings":["School of Computer Science and Electronic Engineering, University of Surrey, Guildford, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Surrey, Guildford, U.K","institution_ids":["https://openalex.org/I28290843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087450445","display_name":"Xiao\u2010Jun Wu","orcid":"https://orcid.org/0000-0002-0310-5778"},"institutions":[{"id":"https://openalex.org/I111599522","display_name":"Jiangnan University","ror":"https://ror.org/04mkzax54","country_code":"CN","type":"education","lineage":["https://openalex.org/I111599522"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaojun Wu","raw_affiliation_strings":["School of Artificial Intelligence and Computer Science and Jiangsu Provincial Laboratory of Pattern Recognition and Computational Intelligence, Jiangnan University, Wuxi, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence and Computer Science and Jiangsu Provincial Laboratory of Pattern Recognition and Computational Intelligence, Jiangnan University, Wuxi, Jiangsu, China","institution_ids":["https://openalex.org/I111599522"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5055922843"],"corresponding_institution_ids":["https://openalex.org/I111599522"],"apc_list":null,"apc_paid":null,"fwci":5.5603,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.96303769,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"19","issue":null,"first_page":"5506","last_page":"5519"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9801999926567078,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9801999926567078,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9757000207901001,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9553999900817871,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8082011938095093},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7525155544281006},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.6293878555297852},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.6133939623832703},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.43212753534317017},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3912639915943146},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3751487731933594}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8082011938095093},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7525155544281006},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.6293878555297852},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.6133939623832703},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43212753534317017},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3912639915943146},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3751487731933594},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3402167","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3402167","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.46000000834465027,"id":"https://metadata.un.org/sdg/10"}],"awards":[{"id":"https://openalex.org/G1481178944","display_name":null,"funder_award_id":"62006097","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G344950217","display_name":null,"funder_award_id":"U1836218","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5041567000","display_name":null,"funder_award_id":"2021M701456","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G8947325903","display_name":null,"funder_award_id":"BK20200593","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":68,"referenced_works":["https://openalex.org/W1834627138","https://openalex.org/W2096733369","https://openalex.org/W2535873859","https://openalex.org/W2607219512","https://openalex.org/W2743674619","https://openalex.org/W2774644650","https://openalex.org/W2797558164","https://openalex.org/W2932026309","https://openalex.org/W2962847335","https://openalex.org/W2962898354","https://openalex.org/W2963428752","https://openalex.org/W2963542245","https://openalex.org/W2969985801","https://openalex.org/W2970255644","https://openalex.org/W2972986629","https://openalex.org/W3015646845","https://openalex.org/W3083540668","https://openalex.org/W3096831136","https://openalex.org/W3110144845","https://openalex.org/W3125713917","https://openalex.org/W3127807678","https://openalex.org/W3169129566","https://openalex.org/W3179103990","https://openalex.org/W3179647175","https://openalex.org/W3185895259","https://openalex.org/W3189402954","https://openalex.org/W3193016045","https://openalex.org/W3193394794","https://openalex.org/W3201386741","https://openalex.org/W3202271600","https://openalex.org/W3213967908","https://openalex.org/W4214870408","https://openalex.org/W4221012309","https://openalex.org/W4226414053","https://openalex.org/W4281255367","https://openalex.org/W4282936640","https://openalex.org/W4285506716","https://openalex.org/W4292794158","https://openalex.org/W4294643831","https://openalex.org/W4300725094","https://openalex.org/W4312402191","https://openalex.org/W4312933868","https://openalex.org/W4312937923","https://openalex.org/W4318718455","https://openalex.org/W4376456710","https://openalex.org/W4380371063","https://openalex.org/W4383753813","https://openalex.org/W4391468387","https://openalex.org/W6637162671","https://openalex.org/W6638046521","https://openalex.org/W6640425456","https://openalex.org/W6725195833","https://openalex.org/W6736207377","https://openalex.org/W6745560452","https://openalex.org/W6758684365","https://openalex.org/W6779823529","https://openalex.org/W6783713337","https://openalex.org/W6786375611","https://openalex.org/W6788990321","https://openalex.org/W6795288823","https://openalex.org/W6795986329","https://openalex.org/W6802302390","https://openalex.org/W6805547681","https://openalex.org/W6838639034","https://openalex.org/W6838695150","https://openalex.org/W6838883754","https://openalex.org/W6840155194","https://openalex.org/W6856577971"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W2347824352","https://openalex.org/W2098693229","https://openalex.org/W2112875849","https://openalex.org/W2384651879"],"abstract_inverted_index":{"Modern":[0],"face":[1],"recognition":[2],"systems":[3],"widely":[4],"use":[5],"deep":[6],"convolutional":[7],"neural":[8],"networks":[9],"(DCNNs).":[10],"However,":[11,87],"DCNNs":[12],"are":[13,149],"susceptible":[14],"to":[15,21,33,47,151,193],"adversarial":[16,25,50,63,91,114,133,144,156,159,186],"examples,":[17,51],"posing":[18],"security":[19],"risks":[20],"these":[22],"systems.":[23],"Transferable":[24],"examples":[26,64,160,187],"that":[27,127,177],"can":[28],"be":[29],"transferred":[30],"from":[31,58],"surrogate":[32],"target":[34],"models":[35,72],"greatly":[36],"undermine":[37],"the":[38,53,130,136,194],"robustness":[39,131],"of":[40,112,132,139],"DCNNs.":[41],"Numerous":[42],"attempts":[43],"have":[44,73,81],"been":[45],"made":[46],"generate":[48],"transferable":[49,113],"but":[52],"existing":[54],"methods":[55],"often":[56],"suffer":[57],"limited":[59],"transferability":[60],"or":[61],"produce":[62],"with":[65,161,188],"poor":[66],"image":[67,78,148,163,190],"perceptual":[68],"quality.":[69,164],"Recently,":[70],"diffusion":[71,140],"shown":[74],"remarkable":[75],"success":[76,182],"in":[77,83,90,110,135],"generation":[79,111],"and":[80,125,146,174,184],"excelled":[82],"various":[84],"downstream":[85],"tasks.":[86],"their":[88],"potential":[89],"attacks":[92],"remains":[93],"largely":[94],"unexplored.":[95],"To":[96],"bridge":[97],"this":[98],"gap,":[99],"we":[100],"propose":[101],"a":[102,119],"novel":[103],"approach,":[104],"namely":[105],"Adversarial":[106],"Diffusion":[107],"Attack":[108],"(ADA),":[109],"facial":[115],"examples.":[116],"ADA":[117,178],"employs":[118],"dynamic":[120],"game-like":[121],"strategy":[122],"between":[123],"injection":[124],"denoising":[126],"progressively":[128],"reinforces":[129],"perturbation":[134,145],"reverse":[137],"process":[138],"model.":[141],"Additionally,":[142],"both":[143],"residual":[147],"embedded":[150],"drift":[152],"benign":[153],"distribution":[154],"towards":[155],"distribution,":[157],"crafting":[158],"high":[162],"Extensive":[165],"experimental":[166],"results":[167],"obtained":[168],"on":[169],"two":[170],"benchmarking":[171],"datasets,":[172],"LFW":[173],"CelebA-HQ,":[175],"demonstrate":[176],"achieves":[179],"higher":[180],"attack":[181],"rates":[183],"produces":[185],"superior":[189],"quality":[191],"compared":[192],"state-of-the-art":[195],"methods.":[196]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2024-05-17T00:00:00"}
