<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>kNN-guided Adversarial Attacks (DISCUSSION PAPER)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>ISTI-CNR</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>via G. Moruzzi</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Italy</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>fabio.massoli</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>fabrizio.falchi</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>giuseppe.amatog@isti.cnr.it</string-name>
        </contrib>
      </contrib-group>
      <abstract>
        <p>In the last decade, we have witnessed a renaissance of Deep Learning models. Nowadays, they are widely used in industrial as well as scienti c elds, and noticeably, these models reached super-human performances on speci c tasks such as image classi cation. Unfortunately, despite their great success, it has been shown that they are vulnerable to adversarial attacks - images to which a speci c amount of noise imperceptible to human eyes have been added to lead the model to a wrong decision. Typically, these malicious images are forged, pursuing a misclassi cation goal. However, when considering the task of Face Recognition (FR), this principle might not be enough to fool the system. Indeed, in the context FR, the deep models are generally used merely as features extractors while the nal task of recognition is accomplished, for example, by similarity measurements. Thus, by crafting adversarials to fool the classi er, it might not be su cient to fool the overall FR pipeline. Starting from this observation, we proposed to use a k-Nearest Neighbour algorithm as guidance to craft adversarial attacks against an FR system. In our study, we showed how this kind of attack could be more threatening for an FR system than misclassi cation-based ones considering both the targeted and untargeted attack strategies.</p>
      </abstract>
      <kwd-group>
        <kwd>Adversarial Attacks Face Recognition Convolutional Neural Networks</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Since the publication of the AlexNet [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] in 2012, Deep Learning (DL) models
started to play a central role in several scienti c and industrial elds. Moreover,
due to the extremely high computational power reached by the modern GPUs,
the use of DL techniques has become state-of-the-art for solving problems such
as: vision (e.g., image classi cation [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], object detection [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]), natural language
processing [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], and sentiment analysis [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Despite this rebirth, there is a severe
Copyright c 2020 for this paper by its authors. Use permitted under Creative
Commons License Attribution 4.0 International (CC BY 4.0). This volume is published
and copyrighted by its editors. SEBD 2020, June 21-24, 2020, Villasimius, Italy.
threat that poses a strong limit to the use of Deep Neural Networks (DNNs) in
real-world scenarios, especially in sensitive contexts such as surveillance systems
[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] for instance. It was recently shown that DNNs are vulnerable to adversarial
samples [
        <xref ref-type="bibr" rid="ref1 ref12">12,1</xref>
        ] - images to which a precise amount of noise imperceptible to
human eyes is added to fool a model. As shown in the next section of the paper, it
is common for the adversaries to craft malicious samples following a misclassi
cation principle, i.e., with the goal in mind of leading a model, such as a classi er,
to output a wrong prediction with very high con dence. However, if we consider
the case of Face Recognition (FR) systems, the game paradigm deeply changes.
Indeed, di erently from the classical classi cation tasks, in the context of FR,
a DNN is usually used merely as a features extractor [
        <xref ref-type="bibr" rid="ref13 ref8">8,13</xref>
        ] while the nal task
of recognition is realized by performing, for example, similarity measurements
among the extracted representations. For instance, we can consider the case of
Face Identi cation (FI) in which the features extracted from a query image has
to be compared with a database of known identities to identify a person. Thus,
adversarials crafted employing a misclassi cation principle might not succeed
in fooling a similarity-based scheme. Generally speaking, we can divide the
attacks against FR systems into two categories, namely: impersonation and evasion
attacks. In the former case, the goal of the attacker is to lead the system to
recognize two faces as belonging to the same person when that it is not true, while
in the latter case he wants the system not to recognize a person. In this context,
starting from the idea of deep representation attacks [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], we proposed a variant
based on the use of a k-Nearest Neighbour (k-NN) algorithm as guidance, to
fool an FR system that relies on similarity measurement to assess queries
identity. Moreover, we showed how such an attack could give rise to a greater threat
concerning misclassi cation-based attacks. The rest of the paper is organized
as follows: in Section 2, we brie y described some known algorithms to craft
adversarial samples. In Section 3 and Section 4, we described our approach and
presented the results of our study, respectively. Finally, in Section 5, we reported
the conclusion and future perspectives of our work.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Adversarial Attacks</title>
      <p>
        Usually, the guiding principle followed while designing adversarial attack
algorithms is to lead the model to assign a wrong label with high probability to
an image. One of the rst studies in this direction was proposed by [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] that
designed an optimization procedure based on the L-BFGS algorithm. Speci cally,
the authors solved the following optimization problem:
min L(x + ; ygt) +
k
k2;
with x +
2 [l; u]m ;
(1)
where L is the loss function, is a parameter found by linear search, ygt is the
ground truth label for the input x, is the adversarial perturbation, l and u
represent the lower and upper bound for the pixel values respectively, and x +
is the current adversarial sample crafted from the given input x. A faster way
to produce malicious images was proposed by [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], in which the authors proposed
to linearize the loss function around the current value of the parameters, thus
crafting the adversarial as:
xadv = x +
sign(rxJ ( ; x; ytrue)) ;
(2)
The method shown in Equation 2 is known as Fast Gradient Sign Method
(FGSM) and allows to craft adversarial samples by only employing a single
gradient step. In Equation 2, rxJ ( ; x; y) is the gradient of the loss function
J evaluated around the current neural network status , x is the input, ytrue
is its label, and is the maximum distortion allowed on the input such that
k x xadv k1&lt; . In [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], the authors proposed a uni ed view on adversarial
attacks and defenses. Speci cally, they reformulated the adversarial training for
deep models as a \saddle-point" optimization problem
min ( ) = min E(x;y) D max L( ; x + ; y)
2S
in which the inner maximization aims at nding an adversarial of a given input x
while the outer minimization problem has the goal of reducing the loss after the
attack. Finally, they proposed an iterative procedure named Projected Gradient
Descent (PGD):
xaNd+v1 =
      </p>
      <p>
        Y (xaNdv +
x+S
sign(rxL( ; x; y))) :
An improved version of the iterative attacks was proposed in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] named
MomentumIterative FGSM (MI-FGSM). The authors integrated a momentum term that
helped to escape from poor local maxima during, thus yielding stronger attacks.
The main idea is rst to evaluate the velocity vector in the gradient direction
and then use it to craft the adversarial. The velocity vector is given by
gN+1 =
gN +
      </p>
      <p>J (xaNdv; y)
k rxJ (xaNdv; y) k1
;
where x0adv = x, g0 = 0, is the decay factor of the running average, and y is the
ground truth label. Finally, the adversarial example in the -vicinity measured
by L2 distance is given by
xaNd+v1 = xaNdv +</p>
      <p>
        gN+1
k gN+1 k2
;
where = =T with T being the total number of iterations. All the attacks
we discussed hitherto focused their attention on fooling a model by letting it
predict a wrong class, with high con dence, for the given input. Nevertheless, the
situation changes in the context of FR systems. Indeed, in such cases, the neural
network is usually not used as a classi er, but as features extractor. For each
query image, the model extracts a deep representation, which in turn is compared
(3)
(4)
(5)
(6)
with a database of known identities. Thus, in those cases, the previous attack
techniques might not be e ective as one could expect. Following this concern,
interesting suggestions on how to design more suited attacks for FR systems
came from [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], the authors formulated the attack against a DNN by
looking at the internal representation of a model, in other words, they focused
their attack on making the deep features of an adversarial as close as possible
to the one of a target query. More formally, given a doublet (Is, It) where the
former is the source image and the latter the target one, the goal of the crafting
process is to nd a new image, I , such that its internal representation at a
speci c layer l of the neural network under attack, l(I ), is as close as possible
to the one of the target image, l(It). Meanwhile, I has to be as close as possible
to the source image, Is, in the input space. The optimization problem can be
formulated as follows:
      </p>
      <p>I = arg min k l(I)</p>
      <p>I
l(It) k22;
subject to k I</p>
      <p>Is k1&lt; ;
(7)
where</p>
      <p>is the maximum perturbation allowed on each pixel.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Proposed Approach</title>
      <p>
        In our experiments, we considered adversarial samples crafted utilizing two
guiding principles. On the one hand, we used a typical misclassi cation-based
approach in which the goal of the attacks was to fool a DNN acting as a classi er.
On the other hand, we proposed an attack in which we explicitly took into
account a more realistic FR setup in which the DNN was used as a features
extractor, and the nal task of the FR was accomplished by employing similarity
measurements among deep representations. In this case, we used our proposed
approach where we considered a k-NN algorithm as guidance to craft adversarial
samples. Finally, we compared the e ectiveness of both approaches to fool an
FR system. Regarding the threatened model, we considered the state-of-the-art
SeNet-50 [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] from which we extracted the deep features at the penultimate layer.
As source dataset, we used the test set of VGGFace2 [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], which comprises 500
identities, that we split into training and experimental sets. To be able to craft
misclassi cation-based attacks, we attached a fully connected (FC) layer on top
of the features extractor, and to train it, we used the training split cited above,
the SGD optimizer with a learning rate of 1:e 3, a momentum of 0.9 and a batch
size equal to 128. Then, we used the PGD [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and the MI-FGSM [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] algorithms
to craft misclassi cation-based adversarials.
      </p>
      <p>
        Concerning our proposed approach, instead, we started by training the k-NN
using the class centroids of the VGGFace2 [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] training split images, and then
we set k=1. Subsequently, we cast the adversarial crafting procedure as an
optimization problem, and we used the L-BFGS algorithm to solve it. Speci cally,
the main parameters to provide to the algorithm were the following: a starting
point from which to begin the optimization procedure, a target, the function to
minimize, and a set of parameters that were directly passed to it. The starting
point was always a query image from which we wanted to craft an adversarial,
while the target was the centroid of the class we wanted to move the adversarial
features close to. As a minimization criterion, we used the regression loss.
Speci cally, the loss was evaluated among the target centroid and the current state
of the adversarial sample deep features. At each step of the optimization
procedure, we used the k-NN to assess if the deep representation of the adversarials
were able to fool the FR system, i.e., if they were close enough to the target
centroid deep representation. If so, we stopped the attack; otherwise, we
continued the optimization. Moreover, to be sure that the adversarial remained closed
enough to the query image so that a human eye could not distinguish between
them, we empirically bounded their distance, in the pixel space, to be: &lt;= 7
(Equation 7). A schematic view of the overall algorithm is given in Figure 1.
      </p>
      <p>Source
Target</p>
      <p>Target</p>
      <p>Source</p>
      <p>Adversarial
noise</p>
      <p>In Figure 1, we reported a face image next to the target centroid (red
rhombus) only to show an example of the identity represented by the target point.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Experimental Results</title>
      <p>
        In this section, we compared the adversarials obtained through our method with
the ones obtained by misclassi cation ones. Speci cally, we compared our
kNN guided attack against PGD [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and MI-FGSM [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] attacks. In Figure 2, we
reported a few examples of the manipulated images produced by our algorithm.
      </p>
      <p>In Figure 2, we can notice how similar the images in the rst and third
columns appear to a human eye. Thus, even though we surfed the features space
to craft the adversarials, we have been able to keep the malicious inputs very
close to the original images in the pixel space. Subsequently, we compared the
adversarials we generated with the k-NN with the ones crafted employing other
attacks. Speci cally, we considered attacks focused on fooling the classi cation
task. Since our goal was to show that misclassi cation-based attacks might not be
suitable to produce samples able to fool an FR system, a fundamental property
to analyze was the euclidean distance among the adversarials deep features and
the centroids of the respective adversarial class. Such a scenario emulates the
case in with the features extracted from a query image have to be compared
against a known database of known identities. The results are shown in Figure 3
for both targeted and untargeted attacks.</p>
      <p>As we can see from Figure 3, the samples generated using the k-NN guided
algorithm have an expected value of the euclidean distance from the (adversarial)
class centroids lower than the ones generated with other attacks. Such a result
holds for targeted as well as untargeted attacks.</p>
      <p>As a gedankenexperiment, we shall suppose that the dotted-dashed black
line in Figure 3 represented the threshold applied by the FR system when it
had to decide on a FI task, for instance. In this case, to identify a person,
the FR system evaluated the distance of the deep features of the query image
from the centroids of the various available identities in the database. Thus, if
we considered the threshold as shown in Figure 3, we observed that the attacks'
success rate for misclassi cation-based attacks dramatically decreased compared
to what happened for the k-NN guided ones. The results are reported in Table 1</p>
      <p>To sum up, we can assess that, in the attempt of attacking an FR
system in which a DNN is used as a backbone features extractor, the use of
misclassi cation-based attacks might not be successful as in classi cation
contexts to fool the recognition system. This happens because, in the FR scenario,
the nal output does not usually rely on the output of a deep classi er instead of
a similarity measurement among deep features. Thus, it is mandatory to consider
such aspects while designing attacks.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusion and Future Perspectives</title>
      <p>The threat of adversarial attacks poses severe limits on the use of deep
learning techniques in sensitive real-world applications such as surveillance systems.
Several algorithms have been proposed to fool a DNN to lead it to output
a wrong prediction with high con dence. As shown, even though a classical
misclassi cation-based attack can fool a neural network used as a classi er, the
very same attack might not be strong enough to fool an FR system in which the
output is based on similarity measurements carried upon deep features. Thus,
di erent strategies have to be considered. We demonstrated that it is possible to
fool an FR system through a deep features attack in which a k-NN is used as a
guide in nding the proper perturbation to apply to the input image. Thus, it is
possible to bring an adversarial closer to the aimed identity features compared
to a misclassi cation-based. These results hold for the targeted and untargeted
attacks. There are several potential extensions of this work. Di erent techniques
to craft adversarials against an FR system might be considered, for example,
with k &gt; 1 or based on other guiding principles. On the other hand, it would be
interesting trying to detect those kinds of attacks in which the adversary tries
to emulate the deep representation of natural images within an attack.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Biggio</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Corona</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maiorca</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nelson</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Srndic</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laskov</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giacinto</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Roli</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Evasion attacks against machine learning at test time</article-title>
          .
          <source>In: Joint European conference on machine learning and knowledge discovery in databases</source>
          . pp.
          <volume>387</volume>
          {
          <fpage>402</fpage>
          . Springer (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Cao</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shen</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xie</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parkhi</surname>
            ,
            <given-names>O.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zisserman</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Vggface2: A dataset for recognising faces across pose and age</article-title>
          .
          <source>In: 2018 13th IEEE International Conference on Automatic Face &amp; Gesture Recognition (FG</source>
          <year>2018</year>
          ). pp.
          <volume>67</volume>
          {
          <fpage>74</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Dong</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liao</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pang</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Su</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhu</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Boosting adversarial attacks with momentum</article-title>
          .
          <source>In: Proceedings of the IEEE conference on computer vision and pattern recognition</source>
          . pp.
          <volume>9185</volume>
          {
          <issue>9193</issue>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Girshick</surname>
          </string-name>
          , R.:
          <string-name>
            <surname>Fast</surname>
          </string-name>
          r-cnn.
          <source>In: Proceedings of the IEEE international conference on computer vision</source>
          . pp.
          <volume>1440</volume>
          {
          <issue>1448</issue>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Goodfellow</surname>
            ,
            <given-names>I.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shlens</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Szegedy</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Explaining and harnessing adversarial examples</article-title>
          .
          <source>arXiv preprint arXiv:1412.6572</source>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Krizhevsky</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sutskever</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hinton</surname>
          </string-name>
          , G.E.:
          <article-title>Imagenet classi cation with deep convolutional neural networks</article-title>
          .
          <source>In: Advances in neural information processing systems</source>
          . pp.
          <volume>1097</volume>
          {
          <issue>1105</issue>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Madry</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Makelov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schmidt</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsipras</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vladu</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Towards deep learning models resistant to adversarial attacks</article-title>
          .
          <source>arXiv preprint arXiv:1706.06083</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Massoli</surname>
            ,
            <given-names>F.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Amato</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Falchi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Cross-resolution learning for face recognition</article-title>
          . arXiv preprint arXiv:
          <year>1912</year>
          .
          <volume>02851</volume>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Ortis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Farinella</surname>
            ,
            <given-names>G.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Battiato</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>An overview on image sentiment analysis: Methods datasets and current challenges</article-title>
          .
          <source>In: Proc. 16th Int. Joint Conf. E-Bus. Telecommun</source>
          . vol.
          <volume>1</volume>
          , pp.
          <volume>290</volume>
          {
          <issue>300</issue>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Sabour</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cao</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faghri</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fleet</surname>
            ,
            <given-names>D.J.:</given-names>
          </string-name>
          <article-title>Adversarial manipulation of deep representations</article-title>
          .
          <source>arXiv preprint arXiv:1511.05122</source>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Sreenu</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Durai</surname>
            ,
            <given-names>M.S.:</given-names>
          </string-name>
          <article-title>Intelligent video surveillance: a review through deep learning techniques for crowd analysis</article-title>
          .
          <source>Journal of Big Data</source>
          <volume>6</volume>
          (
          <issue>1</issue>
          ),
          <volume>48</volume>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Szegedy</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaremba</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sutskever</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bruna</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Erhan</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goodfellow</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fergus</surname>
          </string-name>
          , R.:
          <article-title>Intriguing properties of neural networks</article-title>
          .
          <source>arXiv preprint arXiv:1312.6199</source>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Wang</surname>
          </string-name>
          , F., Cheng, J.,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          , Liu, H.:
          <article-title>Additive margin softmax for face veri cation</article-title>
          .
          <source>IEEE Signal Processing Letters</source>
          <volume>25</volume>
          (
          <issue>7</issue>
          ),
          <volume>926</volume>
          {
          <fpage>930</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Young</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hazarika</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Poria</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cambria</surname>
          </string-name>
          , E.:
          <article-title>Recent trends in deep learning based natural language processing</article-title>
          .
          <source>ieee Computational intelligenCe magazine 13</source>
          (
          <issue>3</issue>
          ),
          <volume>55</volume>
          {
          <fpage>75</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>