{"id":"https://openalex.org/W2796696524","doi":"https://doi.org/10.1145/3175684.3175706","title":"Human Body and Face Detection based Anti-shoulder Attack System on ATM","display_name":"Human Body and Face Detection based Anti-shoulder Attack System on ATM","publication_year":2017,"publication_date":"2017-12-20","ids":{"openalex":"https://openalex.org/W2796696524","doi":"https://doi.org/10.1145/3175684.3175706","mag":"2796696524"},"language":"en","primary_location":{"id":"doi:10.1145/3175684.3175706","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3175684.3175706","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Big Data and Internet of Thing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100369757","display_name":"Chen Li","orcid":"https://orcid.org/0000-0001-5983-5895"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chen Li","raw_affiliation_strings":["School of Computer Science, North China University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055056152","display_name":"Mengti Liang","orcid":null},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengti Liang","raw_affiliation_strings":["School of Computer Science, North China University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101498868","display_name":"Xiao Ke","orcid":"https://orcid.org/0000-0001-9059-5391"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Xiao","raw_affiliation_strings":["School of Computer Science, North China University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086422507","display_name":"Simon Fong","orcid":"https://orcid.org/0000-0002-1848-7246"},"institutions":[{"id":"https://openalex.org/I204512498","display_name":"University of Macau","ror":"https://ror.org/01r4q9n85","country_code":"MO","type":"education","lineage":["https://openalex.org/I204512498"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Simon Fong","raw_affiliation_strings":["Department of Computer and Information Science, University of Macau, Macau, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Science, University of Macau, Macau, China","institution_ids":["https://openalex.org/I204512498"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030326194","display_name":"Qianli Wang","orcid":"https://orcid.org/0000-0001-5834-2087"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianli Wang","raw_affiliation_strings":["School of Computer Science, North China University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067090170","display_name":"Wei Song","orcid":"https://orcid.org/0000-0002-5909-9661"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Song","raw_affiliation_strings":["School of Computer Science, North China University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100369757"],"corresponding_institution_ids":["https://openalex.org/I1456306"],"apc_list":null,"apc_paid":null,"fwci":0.2775,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.66948571,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"145","last_page":"148"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12222","display_name":"IoT-based Smart Home Systems","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6438543200492859},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6297312378883362},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.6119387745857239},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4686533808708191},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1563650369644165}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6438543200492859},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6297312378883362},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.6119387745857239},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4686533808708191},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1563650369644165},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3175684.3175706","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3175684.3175706","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Big Data and Internet of Thing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1538962546","https://openalex.org/W2139094422","https://openalex.org/W2312252781","https://openalex.org/W2507147653","https://openalex.org/W2550139027","https://openalex.org/W2557259976","https://openalex.org/W2611171851"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"Self-service":[0],"bank":[1],"including":[2,17],"ATM":[3,33,53,75],"has":[4],"become":[5],"a":[6],"part":[7],"of":[8,60],"people's":[9],"daily":[10],"life.":[11],"However,":[12],"the":[13,42,58,66,74,84,89],"concomitant":[14],"insecurity":[15],"factors":[16],"PIN":[18],"number":[19],"stolen":[20],"caused":[21],"by":[22],"shoulder":[23],"surfing":[24],"attack":[25,50,97],"can":[26,40,70,87],"lead":[27],"to":[28,80,83],"great":[29],"lose.":[30],"Considering":[31],"that":[32],"is":[34],"all":[35],"equipped":[36],"with":[37],"cameras":[38],"which":[39,86],"capture":[41],"real-time":[43],"videos":[44],"around,":[45],"we":[46],"propose":[47],"an":[48],"anti-shoulder":[49],"system":[51],"on":[52],"in":[54],"this":[55],"paper.":[56],"Through":[57],"combination":[59],"human":[61],"body":[62],"and":[63],"face":[64],"detection,":[65],"potentially":[67],"suspicious":[68],"subject":[69],"be":[71,78],"realized.":[72],"Then,":[73],"users":[76,90],"will":[77],"reminded":[79],"pay":[81],"attention":[82],"surrounding,":[85],"prevent":[88],"from":[91],"encountering":[92],"shoulder-attack":[93],"based":[94],"peeping,":[95],"sneak":[96],"or":[98],"other":[99],"dangerous":[100],"behaviors.":[101]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
