{"id":"https://openalex.org/W4409257799","doi":"https://doi.org/10.1109/tbdata.2025.3558832","title":"Look Closer to Your Enemy: Learning to Attack via Teacher-Student Mimicking","display_name":"Look Closer to Your Enemy: Learning to Attack via Teacher-Student Mimicking","publication_year":2025,"publication_date":"2025-04-08","ids":{"openalex":"https://openalex.org/W4409257799","doi":"https://doi.org/10.1109/tbdata.2025.3558832"},"language":"en","primary_location":{"id":"doi:10.1109/tbdata.2025.3558832","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tbdata.2025.3558832","pdf_url":null,"source":{"id":"https://openalex.org/S2491400915","display_name":"IEEE Transactions on Big Data","issn_l":"2332-7790","issn":["2332-7790","2372-2096"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Big Data","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100634347","display_name":"Mingjie Wang","orcid":"https://orcid.org/0000-0002-2419-8117"},"institutions":[{"id":"https://openalex.org/I12615008","display_name":"Beijing Normal-Hong Kong Baptist University","ror":"https://ror.org/04snvc712","country_code":"CN","type":"education","lineage":["https://openalex.org/I12615008"]},{"id":"https://openalex.org/I141568987","display_name":"Hong Kong Baptist University","ror":"https://ror.org/0145fw131","country_code":"HK","type":"education","lineage":["https://openalex.org/I141568987"]}],"countries":["CN","HK"],"is_corresponding":true,"raw_author_name":"Mingjie Wang","raw_affiliation_strings":["Department of Computer Science, Guangdong Key Lab of AI and Multi-Modal Data Processing, Beijing Normal-Hong Kong Baptist University, Zhuhai, China","Guangdong Key Lab of AI and Multi-Modal Data Processing, Department of Computer Science, Beijing Normal-Hong Kong Baptist University, Zhuhai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Guangdong Key Lab of AI and Multi-Modal Data Processing, Beijing Normal-Hong Kong Baptist University, Zhuhai, China","institution_ids":["https://openalex.org/I12615008","https://openalex.org/I141568987"]},{"raw_affiliation_string":"Guangdong Key Lab of AI and Multi-Modal Data Processing, Department of Computer Science, Beijing Normal-Hong Kong Baptist University, Zhuhai, China","institution_ids":["https://openalex.org/I141568987"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028160889","display_name":"Jianxiong Guo","orcid":"https://orcid.org/0000-0002-0994-3297"},"institutions":[{"id":"https://openalex.org/I25254941","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35","country_code":"CN","type":"education","lineage":["https://openalex.org/I25254941"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianxiong Guo","raw_affiliation_strings":["Advanced Institute of Natural Sciences, Beijing Normal University, Zhuhai, China"],"affiliations":[{"raw_affiliation_string":"Advanced Institute of Natural Sciences, Beijing Normal University, Zhuhai, China","institution_ids":["https://openalex.org/I25254941"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101858043","display_name":"Sirui Li","orcid":"https://orcid.org/0009-0003-7618-9831"},"institutions":[{"id":"https://openalex.org/I12615008","display_name":"Beijing Normal-Hong Kong Baptist University","ror":"https://ror.org/04snvc712","country_code":"CN","type":"education","lineage":["https://openalex.org/I12615008"]},{"id":"https://openalex.org/I141568987","display_name":"Hong Kong Baptist University","ror":"https://ror.org/0145fw131","country_code":"HK","type":"education","lineage":["https://openalex.org/I141568987"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Sirui Li","raw_affiliation_strings":["Department of Computer Science, Guangdong Key Lab of AI and Multi-Modal Data Processing, Beijing Normal-Hong Kong Baptist University, Zhuhai, China","Guangdong Key Lab of AI and Multi-Modal Data Processing, Department of Computer Science, Beijing Normal-Hong Kong Baptist University, Zhuhai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Guangdong Key Lab of AI and Multi-Modal Data Processing, Beijing Normal-Hong Kong Baptist University, Zhuhai, China","institution_ids":["https://openalex.org/I12615008","https://openalex.org/I141568987"]},{"raw_affiliation_string":"Guangdong Key Lab of AI and Multi-Modal Data Processing, Department of Computer Science, Beijing Normal-Hong Kong Baptist University, Zhuhai, China","institution_ids":["https://openalex.org/I141568987"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010420741","display_name":"Dingwen Xiao","orcid":"https://orcid.org/0000-0002-3688-3584"},"institutions":[{"id":"https://openalex.org/I12615008","display_name":"Beijing Normal-Hong Kong Baptist University","ror":"https://ror.org/04snvc712","country_code":"CN","type":"education","lineage":["https://openalex.org/I12615008"]},{"id":"https://openalex.org/I141568987","display_name":"Hong Kong Baptist University","ror":"https://ror.org/0145fw131","country_code":"HK","type":"education","lineage":["https://openalex.org/I141568987"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Dingwen Xiao","raw_affiliation_strings":["Department of Computer Science, Guangdong Key Lab of AI and Multi-Modal Data Processing, Beijing Normal-Hong Kong Baptist University, Zhuhai, China","Guangdong Key Lab of AI and Multi-Modal Data Processing, Department of Computer Science, Beijing Normal-Hong Kong Baptist University, Zhuhai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Guangdong Key Lab of AI and Multi-Modal Data Processing, Beijing Normal-Hong Kong Baptist University, Zhuhai, China","institution_ids":["https://openalex.org/I12615008","https://openalex.org/I141568987"]},{"raw_affiliation_string":"Guangdong Key Lab of AI and Multi-Modal Data Processing, Department of Computer Science, Beijing Normal-Hong Kong Baptist University, Zhuhai, China","institution_ids":["https://openalex.org/I141568987"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067856743","display_name":"Zhiqing Tang","orcid":"https://orcid.org/0000-0002-9375-4818"},"institutions":[{"id":"https://openalex.org/I25254941","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35","country_code":"CN","type":"education","lineage":["https://openalex.org/I25254941"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiqing Tang","raw_affiliation_strings":["Advanced Institute of Natural Sciences, Beijing Normal University, Zhuhai, China"],"affiliations":[{"raw_affiliation_string":"Advanced Institute of Natural Sciences, Beijing Normal University, Zhuhai, China","institution_ids":["https://openalex.org/I25254941"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100634347"],"corresponding_institution_ids":["https://openalex.org/I12615008","https://openalex.org/I141568987"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.03001665,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"11","issue":"6","first_page":"2856","last_page":"2869"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9175000190734863,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9175000190734863,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7477269172668457},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6983997821807861},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4050740897655487}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7477269172668457},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6983997821807861},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4050740897655487}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tbdata.2025.3558832","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tbdata.2025.3558832","pdf_url":null,"source":{"id":"https://openalex.org/S2491400915","display_name":"IEEE Transactions on Big Data","issn_l":"2332-7790","issn":["2332-7790","2372-2096"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Big Data","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5381427449","display_name":null,"funder_award_id":"62202055","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8940082245","display_name":null,"funder_award_id":"2025A1515012843","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337111","display_name":"Basic and Applied Basic Research Foundation of Guangdong Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W300523764","https://openalex.org/W1982925187","https://openalex.org/W2102013737","https://openalex.org/W2194775991","https://openalex.org/W2204750386","https://openalex.org/W2243397390","https://openalex.org/W2302255633","https://openalex.org/W2511791013","https://openalex.org/W2535873859","https://openalex.org/W2584637367","https://openalex.org/W2585635281","https://openalex.org/W2606611007","https://openalex.org/W2774644650","https://openalex.org/W2798302089","https://openalex.org/W2895205756","https://openalex.org/W2896016251","https://openalex.org/W2962926870","https://openalex.org/W2963000559","https://openalex.org/W2963047834","https://openalex.org/W2963289251","https://openalex.org/W2963446712","https://openalex.org/W2963542245","https://openalex.org/W2963690547","https://openalex.org/W2963842104","https://openalex.org/W2997877744","https://openalex.org/W3016193692","https://openalex.org/W3034303554","https://openalex.org/W3040483885","https://openalex.org/W3095467524","https://openalex.org/W3169766753","https://openalex.org/W3176633985","https://openalex.org/W4212838392","https://openalex.org/W4214736485","https://openalex.org/W4320147968"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4388150944","https://openalex.org/W4242235492","https://openalex.org/W2390279801","https://openalex.org/W4387985143","https://openalex.org/W4362599004","https://openalex.org/W2808242528","https://openalex.org/W1567638270"],"abstract_inverted_index":{"Deep":[0],"neural":[1],"networks":[2],"have":[3],"significantly":[4],"advanced":[5],"person":[6],"re-identification":[7],"(ReID)":[8],"applications":[9],"in":[10,111,255],"the":[11,14,27,104,108,173,192,195,205,214,222,225],"realm":[12],"of":[13,29,36,97,106,197,210,218,224],"industrial":[15,43],"internet,":[16],"yet":[17],"they":[18],"remain":[19],"vulnerable.":[20],"Thus,":[21],"it":[22],"is":[23,113],"crucial":[24],"to":[25,41,67,87,116,158],"study":[26],"robustness":[28],"ReID":[30,73,89,131,219,241],"systems,":[31],"as":[32,180],"there":[33],"are":[34],"risks":[35],"adversaries":[37],"using":[38,54],"these":[39],"vulnerabilities":[40],"compromise":[42],"surveillance":[44],"systems.":[45],"Current":[46],"adversarial":[47,160,200,226],"methods":[48],"focus":[49],"on":[50,239],"generating":[51],"attack":[52,74,132],"samples":[53],"misclassification":[55],"feedback":[56],"from":[57,204,221],"victim":[58],"models":[59,220],"(VMs),":[60],"neglecting":[61],"VM's":[62,167],"cognitive":[63,109],"processes.":[64],"We":[65],"seek":[66],"address":[68],"this":[69,122],"by":[70,191],"producing":[71],"authentic":[72],"instances":[75],"through":[76],"VM":[77,92,112],"cognition":[78],"decryption.":[79],"This":[80,176],"approach":[81],"boasts":[82],"advantages":[83],"like":[84],"better":[85],"transferability":[86],"open-set":[88],"tests,":[90],"easier":[91],"misdirection,":[93],"and":[94,99,129,189,216,233,258],"enhanced":[95],"creation":[96],"realistic":[98],"undetectable":[100],"assault":[101],"images.":[102,162],"However,":[103],"task":[105,208],"deciphering":[107],"mechanism":[110],"widely":[114],"considered":[115],"be":[117,265],"a":[118,126,252],"formidable":[119],"challenge.":[120],"In":[121],"paper,":[123],"we":[124,212],"propose":[125],"novel":[127],"inconspicuous":[128],"controllable":[130],"baseline,":[133],"LCYE":[134,164],"(<italic":[135],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[136,138,140,143,145,149,151,154,156,269],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"/><bold":[137],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">L</b><italic":[139],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">ook</i>":[141],"<bold":[142,148,153],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">C</b><italic":[144],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">loser":[146],"to</i>":[147],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Y</b><italic":[150],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">our</i>":[152],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">E</b><italic":[155],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">nemy</i>),":[157],"generate":[159],"query":[161],"Specifically,":[163],"first":[165],"distills":[166],"knowledge":[168,177],"via":[169],"teacher-student":[170],"memory":[171],"mimicking":[172],"proxy":[174],"task.":[175],"prior":[178],"serves":[179],"an":[181],"unambiguous":[182],"cryptographic":[183],"token,":[184],"encapsulating":[185],"elements":[186],"deemed":[187],"indispensable":[188],"plausible":[190],"VM,":[193],"with":[194,251],"intent":[196],"facilitating":[198],"precise":[199],"misdirection.":[201],"Further,":[202],"benefiting":[203],"multiple":[206],"opposing":[207],"framework":[209],"LCYE,":[211],"investigate":[213],"interpretability":[215],"generalization":[217],"view":[223],"attack,":[227],"including":[228],"cross-domain":[229],"adaption,":[230],"cross-model":[231],"consensus,":[232],"online":[234],"learning":[235],"process.":[236],"Extensive":[237],"experiments":[238],"four":[240],"benchmarks":[242],"show":[243],"that":[244],"our":[245],"method":[246],"outperforms":[247],"other":[248],"state-of-the-art":[249],"attackers":[250],"large":[253],"margin":[254],"white-box,":[256],"black-box,":[257],"target":[259],"attacks.":[260],"The":[261],"source":[262],"code":[263],"can":[264],"found":[266],"at":[267],"<uri":[268],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">https://github.com/MingjieWang0606/LCYE-attack_reid</uri>.":[270]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
