TY - STD TI - Y. Zheng, X. Xu, L. Qi, Deep CNN-assisted personalized recommendation over big data for mobile wireless networks. Wireless Communications and Mobile Computing 2019 (2019) ID - ref1 ER - TY - STD TI - Y. Zheng, J. Zhu, W. Fang, L.-H. Chi, Deep learning hash for wireless multimedia image content security. Security and Communication Networks 2018 (2018) ID - ref2 ER - TY - CHAP AU - Wang, H. PY - 2018 DA - 2018// TI - Cosface: large margin cosine loss for deep face recognition BT - Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition ID - Wang2018 ER - TY - CHAP AU - Cao, K. AU - Rong, Y. AU - Li, C. AU - Tang, X. AU - Change Loy, C. PY - 2018 DA - 2018// TI - Pose-robust face recognition via deep residual equivariant mapping BT - Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition ID - Cao2018 ER - TY - JOUR AU - Sun, Y. AU - Liang, D. AU - Wang, X. AU - Tang, X. PY - 2015 DA - 2015// TI - Deepid3: Face recognition with very deep neural networks JO - arXiv preprint arXiv VL - 1502 ID - Sun2015 ER - TY - CHAP AU - Zheng, Z. AU - Yang, X. AU - Yu, Z. AU - Zheng, L. AU - Yang, Y. AU - Kautz, J. PY - 2019 DA - 2019// TI - Joint discriminative and generative learning for person re-identification BT - Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition ID - Zheng2019 ER - TY - STD TI - Y. Li, C. Huang, C.C. Loy, X. Tang, in European Conference on Computer Vision. Human attribute recognition by deep hierarchical contexts (Springer, 2016), pp. 684–700 ID - ref7 ER - TY - CHAP AU - Li, P. AU - Chen, X. AU - Shen, S. PY - 2019 DA - 2019// TI - Stereo r-cnn based 3d object detection for autonomous driving BT - Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition ID - Li2019 ER - TY - STD TI - F. Codevilla, M. Miiller, A. López, V. Koltun, A. Dosovitskiy, in 2018 IEEE International Conference on Robotics and Automation (ICRA). End-to-end driving via conditional imitation learning (IEEE, 2018), pp. 1–9 ID - ref9 ER - TY - JOUR AU - Szegedy, C. PY - 2013 DA - 2013// TI - Intriguing properties of neural networks JO - arXiv preprint arXiv VL - 1312 ID - Szegedy2013 ER - TY - CHAP AU - Krizhevsky, A. AU - Sutskever, I. AU - Hinton, G. E. PY - 2012 DA - 2012// TI - Imagenet classification with deep convolutional neural networks BT - Advances in neural information processing systems ID - Krizhevsky2012 ER - TY - STD TI - Z. Xia, L. Jiang, D. Liu, L. Lu, B. Jeon, BOEW: a content-based image retrieval scheme using bag-of-encrypted-words in cloud computing. IEEE Transactions on Services Computing (2019) ID - ref12 ER - TY - JOUR AU - Xia, Z. AU - Lu, L. AU - Qiu, T. AU - Shim, H. AU - Chen, X. AU - Jeon, B. PY - 2019 DA - 2019// TI - A privacy-preserving image retrieval based on AC-coefficients and color histograms in cloud environment JO - Computers, Materials & Continua VL - 58 UR - https://doi.org/10.32604/cmc.2019.02688 DO - 10.32604/cmc.2019.02688 ID - Xia2019 ER - TY - STD TI - Z. Xia, L. Jiang, X. Ma, W. Yang, P. Ji, N. Xiong, A privacy-preserving outsourcing scheme for image local binary pattern in secure industrial internet of things. IEEE Transactions on Industrial Informatics (2019) ID - ref14 ER - TY - JOUR AU - Xia, Z. AU - Xiong, N. N. AU - Vasilakos, A. V. AU - Sun, X. PY - 2017 DA - 2017// TI - EPCBIR: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing JO - Information Sciences VL - 387 UR - https://doi.org/10.1016/j.ins.2016.12.030 DO - 10.1016/j.ins.2016.12.030 ID - Xia2017 ER - TY - JOUR AU - Xia, Z. AU - Zhu, Y. AU - Sun, X. AU - Qin, Z. AU - Ren, K. PY - 2015 DA - 2015// TI - Towards privacy-preserving content-based image retrieval in cloud computing JO - IEEE Transactions on Cloud Computing VL - 6 UR - https://doi.org/10.1109/TCC.2015.2491933 DO - 10.1109/TCC.2015.2491933 ID - Xia2015 ER - TY - STD TI - M. Sharif, S. Bhagavatula, L. Bauer, and M. K. Reiter, Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition, in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016, pp. 1528-1540: ACM. ID - ref17 ER - TY - JOUR AU - Sharif, M. AU - Bhagavatula, S. AU - Bauer, L. AU - Reiter, M. K. PY - 2017 DA - 2017// TI - Adversarial generative nets: Neural network attacks on state-of-the-art face recognition JO - arXiv preprint arXiv VL - 1801 ID - Sharif2017 ER - TY - CHAP AU - Goswami, G. AU - Ratha, N. AU - Agarwal, A. AU - Singh, R. AU - Vatsa, M. PY - 2018 DA - 2018// TI - Unravelling robustness of deep learning based face recognition against adversarial attacks BT - Thirty-Second AAAI Conference on Artificial Intelligence ID - Goswami2018 ER - TY - BOOK AU - Tang, H. AU - Qin, X. PY - 2004 DA - 2004// TI - Practical methods of optimization PB - Dalian University of Technology Press CY - Dalian ID - Tang2004 ER - TY - STD TI - A. Kurakin et al., in The NIPS'17 Competition: Building Intelligent Systems. Adversarial attacks and defences competition (Springer, 2018), pp. 195–231 ID - ref21 ER - TY - JOUR AU - Brendel, W. PY - 2018 DA - 2018// TI - Adversarial vision challenge JO - arXiv preprint arXiv VL - 1808 ID - Brendel2018 ER - TY - JOUR AU - Goodfellow, I. J. AU - Shlens, J. AU - Szegedy, C. PY - 2014 DA - 2014// TI - Explaining and harnessing adversarial examples JO - arXiv preprint arXiv VL - 1412 ID - Goodfellow2014 ER - TY - JOUR AU - Miyato, T. AU - Maeda, S. -. i. AU - Koyama, M. AU - Ishii, S. PY - 2018 DA - 2018// TI - Virtual adversarial training: a regularization method for supervised and semi-supervised learning JO - IEEE transactions on pattern analysis and machine intelligence VL - 41 UR - https://doi.org/10.1109/TPAMI.2018.2858821 DO - 10.1109/TPAMI.2018.2858821 ID - Miyato2018 ER - TY - JOUR AU - Kurakin, A. AU - Goodfellow, I. AU - Bengio, S. PY - 2016 DA - 2016// TI - Adversarial examples in the physical world JO - arXiv preprint arXiv VL - 1607 ID - Kurakin2016 ER - TY - CHAP AU - Szegedy, C. AU - Vanhoucke, V. AU - Ioffe, S. AU - Shlens, J. AU - Wojna, Z. PY - 2016 DA - 2016// TI - Rethinking the inception architecture for computer vision BT - Proceedings of the IEEE conference on computer vision and pattern recognition ID - Szegedy2016 ER - TY - CHAP AU - Moosavi-Dezfooli, S. -. M. AU - Fawzi, A. AU - Frossard, P. PY - 2016 DA - 2016// TI - Deepfool: a simple and accurate method to fool deep neural networks BT - Proceedings of the IEEE conference on computer vision and pattern recognition ID - Moosavi-Dezfooli2016 ER - TY - CHAP AU - Dong, Y. PY - 2018 DA - 2018// TI - Boosting adversarial attacks with momentum BT - Proceedings of the IEEE conference on computer vision and pattern recognition ID - Dong2018 ER - TY - STD TI - J. Su, D.V. Vargas, K. Sakurai, One pixel attack for fooling deep neural networks. IEEE Transactions on Evolutionary Computation (2019) ID - ref29 ER - TY - BOOK AU - Eykholt, K. PY - 2018 DA - 2018// TI - Robust physical-world attacks on deep learning models ID - Eykholt2018 ER - TY - BOOK AU - Bose, A. J. AU - Aarabi, P. PY - 2018 DA - 2018// TI - Adversarial attacks on face detectors using neural net based constrained optimization UR - https://doi.org/10.1109/MMSP.2018.8547128 DO - 10.1109/MMSP.2018.8547128 ID - Bose2018 ER - TY - BOOK AU - Xia, Z. AU - Yuan, C. AU - Lv, R. AU - Sun, X. AU - Xiong, N. N. AU - Shi, Y. -. Q. PY - 2018 DA - 2018// TI - A novel weber local binary descriptor for fingerprint liveness detection, IEEE Transactions on Systems, Man, and Cybernetics: Systems ID - Xia2018 ER - TY - STD TI - R.F. Nogueira, R. de Alencar Lotufo, R.C. Machado, in 2014 IEEE workshop on biometric measurements and systems for security and medical applications (BIOMS) Proceedings. Evaluating software-based fingerprint liveness detection using convolutional networks and local binary patterns (IEEE, 2014), pp. 22–29 ID - ref33 ER - TY - JOUR AU - Nogueira, R. F. AU - Alencar Lotufo, R. AU - Machado, R. C. PY - 2016 DA - 2016// TI - Fingerprint liveness detection using convolutional neural networks JO - IEEE transactions on information forensics and security VL - 11 UR - https://doi.org/10.1109/TIFS.2016.2520880 DO - 10.1109/TIFS.2016.2520880 ID - Nogueira2016 ER - TY - JOUR AU - Chugh, T. AU - Cao, K. AU - Jain, A. K. PY - 2018 DA - 2018// TI - Fingerprint spoof buster: Use of minutiae-centered patches JO - IEEE Transactions on Information Forensics and Security VL - 13 UR - https://doi.org/10.1109/TIFS.2018.2812193 DO - 10.1109/TIFS.2018.2812193 ID - Chugh2018 ER - TY - JOUR AU - Kim, S. AU - Park, B. AU - Song, B. S. AU - Yang, S. PY - 2016 DA - 2016// TI - Deep belief network based statistical feature learning for fingerprint liveness detection ☆ JO - Pattern Recognition Letters VL - 77 UR - https://doi.org/10.1016/j.patrec.2016.03.015 DO - 10.1016/j.patrec.2016.03.015 ID - Kim2016 ER - TY - JOUR AU - Nguyen, T. AU - Park, E. AU - Cui, X. AU - Nguyen, V. AU - Kim, H. PY - 2018 DA - 2018// TI - fPADnet: small and efficient convolutional neural network for presentation attack detection JO - Sensors VL - 18 UR - https://doi.org/10.3390/s18082532 DO - 10.3390/s18082532 ID - Nguyen2018 ER - TY - STD TI - F. Pala, B. Bhanu, in Deep Learning for Biometrics. Deep triplet embedding representations for liveness detection (Springer, 2017), pp. 287–307 ID - ref38 ER - TY - CHAP AU - Sutskever, I. AU - Martens, J. AU - Dahl, G. AU - Hinton, G. PY - 2013 DA - 2013// TI - On the importance of initialization and momentum in deep learning BT - International conference on machine learning ID - Sutskever2013 ER - TY - CHAP AU - Kai, C. AU - Liul, E. AU - Pangi, L. AU - Liangi, J. AU - Jie, T. PY - 2011 DA - 2011// TI - Fingerprint matching by incorporating minutiae discriminability BT - International Joint Conference on Biometrics ID - Kai2011 ER - TY - JOUR AU - Polyak, B. T. PY - 1964 DA - 1964// TI - Some methods of speeding up the convergence of iteration methods JO - USSR Computational Mathematics and Mathematical Physics VL - 4 UR - https://doi.org/10.1016/0041-5553(64)90137-5 DO - 10.1016/0041-5553(64)90137-5 ID - Polyak1964 ER - TY - CHAP AU - Ghiani, L. PY - 2013 DA - 2013// TI - LivDet 2013 Fingerprint Liveness Detection Competition 2013 BT - Iapr International Conference on Biometrics ID - Ghiani2013 ER - TY - JOUR AU - Ghiani, L. AU - Yambay, D. A. AU - Mura, V. AU - Marcialis, G. L. AU - Roli, F. AU - Schuckers, S. A. PY - 2017 DA - 2017// TI - Review of the Fingerprint Liveness Detection (LivDet) competition series: 2009 to 2015 JO - Image and Vision Computing VL - 58 UR - https://doi.org/10.1016/j.imavis.2016.07.002 DO - 10.1016/j.imavis.2016.07.002 ID - Ghiani2017 ER -