{"id":"https://openalex.org/W7094969324","doi":"https://doi.org/10.1145/3746027.3755016","title":"FAB-Attack: Fabric-Aware Adversarial Attacks on Person Detectors under Motion Blur","display_name":"FAB-Attack: Fabric-Aware Adversarial Attacks on Person Detectors under Motion Blur","publication_year":2025,"publication_date":"2025-10-25","ids":{"openalex":"https://openalex.org/W7094969324","doi":"https://doi.org/10.1145/3746027.3755016"},"language":null,"primary_location":{"id":"doi:10.1145/3746027.3755016","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3746027.3755016","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd ACM International Conference on Multimedia","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Jiaqi Hou","orcid":"https://orcid.org/0009-0004-4339-7906"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiaqi Hou","raw_affiliation_strings":["National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Kewei Zhang","orcid":"https://orcid.org/0009-0008-6038-5279"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kewei Zhang","raw_affiliation_strings":["National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Tianyu Yang","orcid":"https://orcid.org/0009-0005-8931-7008"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianyu Yang","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Chengyu Jia","orcid":"https://orcid.org/0009-0004-2929-8442"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengyu Jia","raw_affiliation_strings":["National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Qiqi Lin","orcid":"https://orcid.org/0009-0008-6375-2863"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiqi Lin","raw_affiliation_strings":["School of Software and Microelectronics, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software and Microelectronics, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Hui Wei","orcid":"https://orcid.org/0000-0002-2144-2065"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Wei","raw_affiliation_strings":["National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":null,"display_name":"Zheng Wang","orcid":"https://orcid.org/0000-0003-3846-9157"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Wang","raw_affiliation_strings":["National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Multimedia Software, School of Computer Science, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.78572987,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"7625","last_page":"7634"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9380999803543091,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9380999803543091,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.008700000122189522,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.007600000128149986,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deblurring","display_name":"Deblurring","score":0.8095999956130981},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7473999857902527},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.656000018119812},{"id":"https://openalex.org/keywords/motion-blur","display_name":"Motion blur","score":0.5473999977111816},{"id":"https://openalex.org/keywords/motion","display_name":"Motion (physics)","score":0.517799973487854},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.43459999561309814},{"id":"https://openalex.org/keywords/monocular","display_name":"Monocular","score":0.4235999882221222},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.3666999936103821},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.3483999967575073}],"concepts":[{"id":"https://openalex.org/C2777693668","wikidata":"https://www.wikidata.org/wiki/Q25053743","display_name":"Deblurring","level":5,"score":0.8095999956130981},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7473999857902527},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7357000112533569},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.7289000153541565},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6650000214576721},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.656000018119812},{"id":"https://openalex.org/C2777708103","wikidata":"https://www.wikidata.org/wiki/Q852589","display_name":"Motion blur","level":3,"score":0.5473999977111816},{"id":"https://openalex.org/C104114177","wikidata":"https://www.wikidata.org/wiki/Q79782","display_name":"Motion (physics)","level":2,"score":0.517799973487854},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.43459999561309814},{"id":"https://openalex.org/C65909025","wikidata":"https://www.wikidata.org/wiki/Q1945033","display_name":"Monocular","level":2,"score":0.4235999882221222},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.3666999936103821},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.3483999967575073},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.3255999982357025},{"id":"https://openalex.org/C10161872","wikidata":"https://www.wikidata.org/wiki/Q557891","display_name":"Motion estimation","level":2,"score":0.3246000111103058},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.31940001249313354},{"id":"https://openalex.org/C2780624872","wikidata":"https://www.wikidata.org/wiki/Q852453","display_name":"Motion detection","level":3,"score":0.3151000142097473},{"id":"https://openalex.org/C200873422","wikidata":"https://www.wikidata.org/wiki/Q5448821","display_name":"Filling-in","level":2,"score":0.3138999938964844},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.29580000042915344},{"id":"https://openalex.org/C2776196576","wikidata":"https://www.wikidata.org/wiki/Q196113","display_name":"Camouflage","level":2,"score":0.2922999858856201},{"id":"https://openalex.org/C13662910","wikidata":"https://www.wikidata.org/wiki/Q193139","display_name":"Trajectory","level":2,"score":0.29109999537467957},{"id":"https://openalex.org/C145565327","wikidata":"https://www.wikidata.org/wiki/Q852514","display_name":"Motion control","level":3,"score":0.27639999985694885},{"id":"https://openalex.org/C106430172","wikidata":"https://www.wikidata.org/wiki/Q6002272","display_name":"Image restoration","level":4,"score":0.27250000834465027},{"id":"https://openalex.org/C2777036941","wikidata":"https://www.wikidata.org/wiki/Q6917771","display_name":"Motion analysis","level":2,"score":0.2671999931335449},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.26269999146461487},{"id":"https://openalex.org/C202615002","wikidata":"https://www.wikidata.org/wiki/Q783507","display_name":"Differentiable function","level":2,"score":0.25699999928474426},{"id":"https://openalex.org/C146159030","wikidata":"https://www.wikidata.org/wiki/Q7625099","display_name":"Structure from motion","level":3,"score":0.2533000111579895}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3746027.3755016","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3746027.3755016","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd ACM International Conference on Multimedia","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1861492603","https://openalex.org/W2535873859","https://openalex.org/W3017485054","https://openalex.org/W3154528133","https://openalex.org/W3176041926","https://openalex.org/W3196107314","https://openalex.org/W3205672068","https://openalex.org/W3207918547","https://openalex.org/W4312678820","https://openalex.org/W4312812783","https://openalex.org/W4382318250","https://openalex.org/W4382457774","https://openalex.org/W4385490056","https://openalex.org/W4386083027","https://openalex.org/W4389076229","https://openalex.org/W4399263198","https://openalex.org/W4399725484","https://openalex.org/W4404876415"],"related_works":[],"abstract_inverted_index":{"Physical":[0],"adversarial":[1,52,88,147],"attacks":[2],"on":[3,132,169],"person":[4,64],"detectors":[5,65],"reveal":[6],"critical":[7],"vulnerabilities":[8],"in":[9,146,178],"safety-critical":[10],"vision":[11],"systems":[12],"such":[13],"as":[14],"autonomous":[15],"driving":[16],"and":[17,25,33,47,61,66,93,114,129,173],"surveillance.":[18],"While":[19],"recent":[20],"methods":[21],"enhance":[22,71,150],"attack":[23,53,72],"efficacy":[24],"robustness,":[26],"they":[27],"often":[28],"neglect":[29],"realistic":[30,56,95],"garment":[31,57],"deformations":[32],"motion":[34,112,126,154,184],"blur,":[35],"limiting":[36],"real-world":[37,104],"performance.":[38],"In":[39],"this":[40,133],"work,":[41],"we":[42,78,106,118,135],"propose":[43],"FAB-Attack":[44],"(Fabric-a":[45],"ware":[46],"Blur-resistant":[48],"Attack),":[49],"a":[50,80,108,137,175],"new":[51],"that":[54,142,159],"simulates":[55,94],"deformation":[58],"during":[59,125],"training":[60],"targets":[62],"both":[63],"image":[67],"deblurring":[68,115],"models.":[69],"To":[70,101],"effectiveness":[73],"under":[74,182],"varying":[75],"clothing":[76,91],"deformations,":[77],"introduce":[79],"Fabric-aware":[81],"Texture":[82],"Appliance":[83],"(FTA)":[84],"module,":[85],"which":[86],"applies":[87],"textures":[89],"to":[90,149,167],"regions":[92],"fabric":[96],"dynamics":[97],"via":[98],"physics-inspired":[99],"TPS.":[100],"better":[102],"emulate":[103],"conditions,":[105],"develop":[107],"differentiable":[109],"pipeline":[110],"incorporating":[111],"blur":[113],"processes.":[116],"Moreover,":[117],"demonstrate":[119,158],"the":[120,170,179],"stability":[121],"of":[122],"low-frequency":[123],"information":[124],"blur's":[127],"generation":[128],"removal.":[130],"Based":[131],"insight,":[134],"design":[136],"frequency":[138],"band":[139],"separation":[140],"mechanism":[141],"suppresses":[143],"high-frequency":[144],"components":[145],"patterns":[148],"further":[151],"robustness":[152],"against":[153],"blur.":[155,185],"Experimental":[156],"results":[157],"our":[160],"approach":[161],"achieves":[162],"SOTA":[163],"performance,":[164],"reducing":[165],"AP":[166],"25.2%":[168],"COCO":[171],"dataset":[172],"achieving":[174],"94.4%":[176],"ASR":[177],"real":[180],"world":[181],"severe":[183]},"counts_by_year":[],"updated_date":"2026-02-20T08:17:22.645390","created_date":"2025-10-25T00:00:00"}
