{"id":"https://openalex.org/W4399556645","doi":"https://doi.org/10.1145/3658664.3659630","title":"AdvOcl: Naturalistic Clothing Pattern Adversarial to Person Detectors in Occlusion","display_name":"AdvOcl: Naturalistic Clothing Pattern Adversarial to Person Detectors in Occlusion","publication_year":2024,"publication_date":"2024-06-12","ids":{"openalex":"https://openalex.org/W4399556645","doi":"https://doi.org/10.1145/3658664.3659630"},"language":"en","primary_location":{"id":"doi:10.1145/3658664.3659630","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3658664.3659630","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062837505","display_name":"Zhitong Lu","orcid":"https://orcid.org/0009-0005-5279-0029"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhitong Lu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China &amp; School of Cyber Security, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China &amp; School of Cyber Security, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066219365","display_name":"Duohe Ma","orcid":"https://orcid.org/0000-0002-2160-8344"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Duohe Ma","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075710187","display_name":"Linna Fan","orcid":"https://orcid.org/0000-0003-2269-1175"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linna Fan","raw_affiliation_strings":["College of Information and Communication, National University of Defense Technology, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004682581","display_name":"Zhen Xu","orcid":"https://orcid.org/0009-0006-8579-5544"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Xu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012413450","display_name":"K. Chen","orcid":"https://orcid.org/0009-0008-1317-8015"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Chen","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5062837505"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":0.5248,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.63315275,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"165","last_page":"174"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11605","display_name":"Visual Attention and Saliency Detection","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8135857582092285},{"id":"https://openalex.org/keywords/clothing","display_name":"Clothing","score":0.6888061761856079},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6118603944778442},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.5405091643333435},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4715944230556488},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3591516613960266},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3351204991340637},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.06707778573036194},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.04874485731124878}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8135857582092285},{"id":"https://openalex.org/C530175646","wikidata":"https://www.wikidata.org/wiki/Q11460","display_name":"Clothing","level":2,"score":0.6888061761856079},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6118603944778442},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.5405091643333435},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4715944230556488},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3591516613960266},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3351204991340637},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.06707778573036194},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.04874485731124878},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3658664.3659630","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3658664.3659630","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Gender equality","id":"https://metadata.un.org/sdg/5","score":0.550000011920929}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1861492603","https://openalex.org/W1981496314","https://openalex.org/W2128409098","https://openalex.org/W2161969291","https://openalex.org/W2598915960","https://openalex.org/W2607219512","https://openalex.org/W2766447205","https://openalex.org/W2774018344","https://openalex.org/W2962730651","https://openalex.org/W2963726920","https://openalex.org/W2964050021","https://openalex.org/W2969664989","https://openalex.org/W2990737297","https://openalex.org/W2991079364","https://openalex.org/W3013135579","https://openalex.org/W3109585842","https://openalex.org/W3120349939","https://openalex.org/W3176477939","https://openalex.org/W3185095134","https://openalex.org/W3200450146","https://openalex.org/W3204155906","https://openalex.org/W3205672068","https://openalex.org/W3211999566","https://openalex.org/W4213096266","https://openalex.org/W4221139075","https://openalex.org/W4226530765","https://openalex.org/W4281758639","https://openalex.org/W4293846201","https://openalex.org/W4300978622","https://openalex.org/W4308614312","https://openalex.org/W4312141651","https://openalex.org/W4312933868","https://openalex.org/W4320477840","https://openalex.org/W4386076325","https://openalex.org/W4386083027","https://openalex.org/W6950310954"],"related_works":["https://openalex.org/W2738456166","https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W2352745894","https://openalex.org/W2057731951","https://openalex.org/W2358836583","https://openalex.org/W1561927205","https://openalex.org/W3191453585"],"abstract_inverted_index":{"Automated":[0],"surveillance":[1],"cameras":[2],"equipped":[3],"with":[4,196],"intelligent":[5],"person":[6,42,64,137],"detection":[7,43],"systems":[8],"are":[9,45,47,75,94,131],"believed":[10],"to":[11,49,57,78,103,157,230],"have":[12,31,54,69],"reached":[13],"the":[14,87,90,111,129,134,149,154,165,179,209,212,215],"maturity":[15],"required":[16],"for":[17],"deployment":[18],"in":[19,86,97,101,114,133,187,218,226],"Intelligent":[20,23],"Transport":[21],"Systems,":[22],"Plants,":[24],"and":[25,84,99,122,128,138,181,189,198,223],"so":[26],"on.":[27],"However,":[28],"recent":[29],"studies":[30],"revealed":[32],"that":[33,61,147,160],"Deep":[34],"Learning":[35],"Neural":[36],"Networks":[37],"(DNN),":[38],"on":[39],"which":[40],"mainstream":[41],"models":[44],"built,":[46],"vulnerable":[48],"adversarial":[50,59,73,112,182],"attacks.":[51],"Several":[52],"methods":[53,68],"been":[55],"proposed":[56,216],"generate":[58,158],"patches":[60,74,113,130],"can":[62],"evade":[63],"detectors.":[65],"Nevertheless,":[66],"these":[67,72],"limitations,":[70],"as":[71,172],"either":[76],"restricted":[77],"being":[79],"presented":[80],"without":[81],"any":[82],"occlusion":[83,191],"placed":[85],"center":[88,135],"of":[89,136,153,164,168,203,214],"person,":[91],"or":[92,194],"they":[93],"too":[95],"large":[96],"size":[98],"standing-out":[100],"pattern":[102],"be":[104],"easily":[105],"ignored":[106],"by":[107,184],"human":[108,125],"eyes.":[109],"Therefore,":[110],"previous":[115],"works":[116],"did":[117],"not":[118,132],"consider":[119],"both":[120],"robustness":[121],"stealthiness":[123],"when":[124],"posture":[126,188],"changes":[127,186],"partially":[139,190],"occluded.":[140],"In":[141],"this":[142],"paper,":[143],"we":[144],"propose":[145],"AdvOcl":[146,177],"leverages":[148],"learned":[150],"image":[151],"manifold":[152],"diffusion":[155],"model":[156],"patterns":[159,225],"resemble":[161],"one":[162],"kind":[163],"typical":[166],"textures":[167],"daily":[169],"clothes,":[170],"such":[171],"common":[173],"floral":[174],"styles.":[175],"Moreover,":[176],"improved":[178],"adaptability":[180],"effectiveness":[183,213],"supporting":[185],"during":[192],"walking":[193],"running":[195],"warping":[197],"alignment":[199],"module":[200],"modeling":[201],"deformation":[202],"clothes.":[204],"Through":[205],"extensive":[206],"quantitative":[207],"experiments,":[208],"results":[210],"demonstrate":[211],"approach":[217],"generating":[219],"more":[220],"adversarially":[221],"effective":[222],"naturalistic":[224],"occluded":[227],"scenarios":[228],"compared":[229],"other":[231],"state-of-the-art":[232],"patch":[233],"generation":[234],"methods.":[235]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
