{"id":"https://openalex.org/W7126211952","doi":"https://doi.org/10.1109/raid67961.2025.00014","title":"BadLogo: A Physically Realizable Adversarial Sticker for Evaluating the Robustness of Face Recognition Models","display_name":"BadLogo: A Physically Realizable Adversarial Sticker for Evaluating the Robustness of Face Recognition Models","publication_year":2025,"publication_date":"2025-10-19","ids":{"openalex":"https://openalex.org/W7126211952","doi":"https://doi.org/10.1109/raid67961.2025.00014"},"language":null,"primary_location":{"id":"doi:10.1109/raid67961.2025.00014","is_oa":false,"landing_page_url":"https://doi.org/10.1109/raid67961.2025.00014","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085839612","display_name":"Fuqi Qi","orcid":"https://orcid.org/0000-0002-3087-3182"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fuqi Qi","raw_affiliation_strings":["Xidian University,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Xidian University,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123529016","display_name":"Haichang Gao","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haichang Gao","raw_affiliation_strings":["Xidian University,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Xidian University,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038703670","display_name":"Boling Li","orcid":"https://orcid.org/0000-0003-4728-3848"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Boling Li","raw_affiliation_strings":["Xidian University,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Xidian University,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124345910","display_name":"Shiping Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shiping Guo","raw_affiliation_strings":["Xidian University,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Xidian University,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124436211","display_name":"Yuming Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuming Zheng","raw_affiliation_strings":["Xidian University,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Xidian University,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124403299","display_name":"Bingqian Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bingqian Zhou","raw_affiliation_strings":["Xidian University,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Xidian University,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5085839612"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.87489679,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"597","last_page":"610"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9358999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9358999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.03400000184774399,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.004800000227987766,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8213000297546387},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.6607999801635742},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6600000262260437},{"id":"https://openalex.org/keywords/transferability","display_name":"Transferability","score":0.4867999851703644},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.4708999991416931},{"id":"https://openalex.org/keywords/categorization","display_name":"Categorization","score":0.4050999879837036},{"id":"https://openalex.org/keywords/cognitive-neuroscience-of-visual-object-recognition","display_name":"Cognitive neuroscience of visual object recognition","score":0.4025000035762787},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.38749998807907104}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8213000297546387},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7050999999046326},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.6607999801635742},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6600000262260437},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6007000207901001},{"id":"https://openalex.org/C61272859","wikidata":"https://www.wikidata.org/wiki/Q7834031","display_name":"Transferability","level":3,"score":0.4867999851703644},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.4708999991416931},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.40939998626708984},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.4050999879837036},{"id":"https://openalex.org/C64876066","wikidata":"https://www.wikidata.org/wiki/Q5141226","display_name":"Cognitive neuroscience of visual object recognition","level":3,"score":0.4025000035762787},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.38749998807907104},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3808000087738037},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.3776000142097473},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.35100001096725464},{"id":"https://openalex.org/C87833898","wikidata":"https://www.wikidata.org/wiki/Q1060280","display_name":"Advanced driver assistance systems","level":2,"score":0.34049999713897705},{"id":"https://openalex.org/C6528762","wikidata":"https://www.wikidata.org/wiki/Q1574298","display_name":"Traffic sign recognition","level":4,"score":0.33329999446868896},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.32910001277923584},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.3260999917984009},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.2874000072479248},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.272599995136261},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2694000005722046},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.26269999146461487},{"id":"https://openalex.org/C153180980","wikidata":"https://www.wikidata.org/wiki/Q19776675","display_name":"Commit","level":2,"score":0.2615000009536743},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.2581999897956848},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.25609999895095825}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/raid67961.2025.00014","is_oa":false,"landing_page_url":"https://doi.org/10.1109/raid67961.2025.00014","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W1834627138","https://openalex.org/W1932198206","https://openalex.org/W2096733369","https://openalex.org/W2180612164","https://openalex.org/W2520774990","https://openalex.org/W2594877703","https://openalex.org/W2746600820","https://openalex.org/W2765424254","https://openalex.org/W2774644650","https://openalex.org/W2788741149","https://openalex.org/W2797558164","https://openalex.org/W2798302089","https://openalex.org/W2886934227","https://openalex.org/W2900153411","https://openalex.org/W2905423756","https://openalex.org/W2932026309","https://openalex.org/W2962711307","https://openalex.org/W2962898354","https://openalex.org/W2963448658","https://openalex.org/W2963466847","https://openalex.org/W2963516603","https://openalex.org/W2963726920","https://openalex.org/W2963839617","https://openalex.org/W2963857521","https://openalex.org/W2964152294","https://openalex.org/W2969664989","https://openalex.org/W2971058209","https://openalex.org/W2972986629","https://openalex.org/W2973021304","https://openalex.org/W2981011605","https://openalex.org/W2981597369","https://openalex.org/W2998771449","https://openalex.org/W3015646845","https://openalex.org/W3034521057","https://openalex.org/W3034823537","https://openalex.org/W3035447895","https://openalex.org/W3096831136","https://openalex.org/W3097573595","https://openalex.org/W3166898278","https://openalex.org/W3175552508","https://openalex.org/W3189402954","https://openalex.org/W3194110702","https://openalex.org/W3215404543","https://openalex.org/W4220772272","https://openalex.org/W4224923640","https://openalex.org/W4282936640","https://openalex.org/W4312546057","https://openalex.org/W4312870564","https://openalex.org/W4385490328","https://openalex.org/W4386076048","https://openalex.org/W4392515156","https://openalex.org/W4402776114","https://openalex.org/W4405306317","https://openalex.org/W4408353610"],"related_works":[],"abstract_inverted_index":{"Deep":[0],"learning-based":[1],"face":[2,147,166],"recognition":[3,148,167],"systems":[4,168],"are":[5],"increasingly":[6],"deployed":[7],"in":[8,110,165],"security-critical":[9],"applications,":[10],"yet":[11],"remain":[12],"vulnerable":[13],"to":[14,62,136,152],"adversarial":[15,69,158],"attacks.":[16],"Existing":[17],"physical":[18,86],"attacks":[19],"often":[20],"lack":[21],"stealth":[22],"or":[23,112],"realism,":[24],"limiting":[25],"their":[26],"utility":[27],"for":[28,176],"evaluating":[29],"realworld":[30],"robustness.":[31],"To":[32,88],"address":[33],"this,":[34],"we":[35,95],"propose":[36],"BadLogo,":[37],"a":[38,58,97],"physically":[39],"realizable,":[40],"sticker-based":[41],"perturbation":[42],"that":[43,125],"balances":[44],"attack":[45,55,114,129],"effectiveness":[46],"and":[47,92,106,121,150,172],"visual":[48,93],"plausibility.":[49],"We":[50],"also":[51],"introduce":[52],"PLOF-GAN,":[53],"an":[54],"model":[56],"employing":[57],"two-stage":[59],"pretraining":[60],"strategy":[61],"progressively":[63],"transform":[64],"benign":[65],"logos":[66],"into":[67],"high-quality":[68],"patches.":[70],"An":[71],"improved":[72],"3D":[73],"mapping":[74],"algorithm":[75],"ensures":[76],"precise":[77],"alignment":[78],"with":[79,132],"facial":[80],"geometry,":[81],"enhancing":[82],"the":[83],"realism":[84],"of":[85],"deployment.":[87],"quantitatively":[89],"assess":[90],"stealthiness":[91,134],"plausibility,":[94],"design":[96],"new":[98,174],"metric,":[99],"BROI,":[100],"which":[101],"measures":[102],"both":[103],"region":[104],"occlusion":[105],"semantic":[107],"coherence.":[108],"Whether":[109],"evasion":[111],"impersonation":[113],"scenarios,":[115],"extensive":[116],"experiments":[117],"on":[118],"identity":[119],"verification":[120],"identification":[122],"tasks":[123],"demonstrate":[124],"BadLogo":[126],"achieves":[127],"high":[128],"success":[130],"rates":[131],"superior":[133],"compared":[135],"existing":[137],"methods.":[138],"Notably,":[139],"our":[140],"approach":[141],"exhibits":[142],"strong":[143],"transferability":[144],"across":[145],"multiple":[146],"models":[149],"generalizes":[151],"object":[153],"detection":[154],"scenarios.":[155],"By":[156],"leveraging":[157],"stickers,":[159],"this":[160],"work":[161],"reveals":[162],"critical":[163],"vulnerabilities":[164],"under":[169],"physical-world":[170],"conditions":[171],"offers":[173],"perspectives":[175],"developing":[177],"more":[178],"robust":[179],"models.":[180]},"counts_by_year":[],"updated_date":"2026-02-03T00:53:05.648605","created_date":"2026-02-01T00:00:00"}
