{"id":"https://openalex.org/W4408029987","doi":"https://doi.org/10.1109/tcsvt.2025.3546702","title":"Toward a Universal, Transferable, and Robust Adversarial Perturbation Framework Against Deep Hashing-Based Facial Image Retrieval","display_name":"Toward a Universal, Transferable, and Robust Adversarial Perturbation Framework Against Deep Hashing-Based Facial Image Retrieval","publication_year":2025,"publication_date":"2025-02-28","ids":{"openalex":"https://openalex.org/W4408029987","doi":"https://doi.org/10.1109/tcsvt.2025.3546702"},"language":"en","primary_location":{"id":"doi:10.1109/tcsvt.2025.3546702","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2025.3546702","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101423908","display_name":"Long Tang","orcid":"https://orcid.org/0000-0002-9345-0312"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Long Tang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"raw_orcid":"https://orcid.org/0000-0002-9345-0312","affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100587178","display_name":"Yunna Lv","orcid":"https://orcid.org/0009-0007-7733-5246"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunna Lv","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"raw_orcid":"https://orcid.org/0009-0007-7733-5246","affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050526815","display_name":"Dengpan Ye","orcid":"https://orcid.org/0000-0003-2510-9523"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dengpan Ye","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"raw_orcid":"https://orcid.org/0000-0003-2510-9523","affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111568584","display_name":"Yiheng He","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiheng He","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"raw_orcid":"https://orcid.org/0009-0009-1768-0034","affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052678886","display_name":"Ziyi Liu","orcid":"https://orcid.org/0000-0002-6796-650X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziyi Liu","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"raw_orcid":"https://orcid.org/0000-0002-6796-650X","affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102654528","display_name":"Caiyun Xie","orcid":"https://orcid.org/0009-0003-3543-1505"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Caiyun Xie","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"raw_orcid":"https://orcid.org/0009-0003-3543-1505","affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101423908"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":2.2403,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.8628438,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"35","issue":"8","first_page":"7423","last_page":"7438"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11105","display_name":"Advanced Image Processing Techniques","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7337457537651062},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6215469837188721},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5798949003219604},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5073308348655701},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4617924690246582},{"id":"https://openalex.org/keywords/image-retrieval","display_name":"Image retrieval","score":0.4583740234375},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4427534341812134},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.371348112821579},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3568114638328552},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3307799994945526},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14218059182167053}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7337457537651062},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6215469837188721},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5798949003219604},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5073308348655701},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4617924690246582},{"id":"https://openalex.org/C1667742","wikidata":"https://www.wikidata.org/wiki/Q10927554","display_name":"Image retrieval","level":3,"score":0.4583740234375},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4427534341812134},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.371348112821579},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3568114638328552},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3307799994945526},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14218059182167053}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcsvt.2025.3546702","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2025.3546702","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5045351556","display_name":null,"funder_award_id":"62072343","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5463932626","display_name":null,"funder_award_id":"2042023kf0228","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G5626719751","display_name":null,"funder_award_id":"62472325","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6956838330","display_name":null,"funder_award_id":"2042023kf0228","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":61,"referenced_works":["https://openalex.org/W2194775991","https://openalex.org/W2411707397","https://openalex.org/W2543927648","https://openalex.org/W2774644650","https://openalex.org/W2904169782","https://openalex.org/W2914147668","https://openalex.org/W2945556069","https://openalex.org/W2962847335","https://openalex.org/W2963542245","https://openalex.org/W2963839617","https://openalex.org/W2964280870","https://openalex.org/W2984942115","https://openalex.org/W2998279441","https://openalex.org/W3009756253","https://openalex.org/W3009806461","https://openalex.org/W3025784200","https://openalex.org/W3034239448","https://openalex.org/W3035237306","https://openalex.org/W3046235874","https://openalex.org/W3093981303","https://openalex.org/W3108980562","https://openalex.org/W3127084502","https://openalex.org/W3175311435","https://openalex.org/W3185951101","https://openalex.org/W3186991201","https://openalex.org/W3196621661","https://openalex.org/W3198892687","https://openalex.org/W3206937959","https://openalex.org/W3207117534","https://openalex.org/W4214764354","https://openalex.org/W4283693981","https://openalex.org/W4283797276","https://openalex.org/W4293846201","https://openalex.org/W4294409011","https://openalex.org/W4312454624","https://openalex.org/W4312790346","https://openalex.org/W4312820932","https://openalex.org/W4313123992","https://openalex.org/W4313555242","https://openalex.org/W4323022360","https://openalex.org/W4361991035","https://openalex.org/W4379033967","https://openalex.org/W4379622969","https://openalex.org/W4380303571","https://openalex.org/W4385767898","https://openalex.org/W4386038437","https://openalex.org/W4386072305","https://openalex.org/W4387969331","https://openalex.org/W4389473983","https://openalex.org/W4389961033","https://openalex.org/W4392172855","https://openalex.org/W4393002335","https://openalex.org/W4393159260","https://openalex.org/W4400447302","https://openalex.org/W4401806115","https://openalex.org/W4401878786","https://openalex.org/W6630649318","https://openalex.org/W6637373629","https://openalex.org/W6640425456","https://openalex.org/W6768366551","https://openalex.org/W6850009027"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W3210945214","https://openalex.org/W3023219121","https://openalex.org/W2035244949"],"abstract_inverted_index":{"Deep":[0],"Hashing":[1],"(DH)":[2],"based":[3],"image":[4,87,199,215,278],"retrieval":[5,44],"is":[6,21,165],"commonly":[7,54],"used":[8],"in":[9,154,212,226,241,252,268],"facial":[10,86,214,277],"recognition":[11],"systems":[12],"for":[13,65,112,134],"its":[14],"precision":[15],"and":[16,80,107,137,157,170,182,198,210,229,247,254],"effectiveness.":[17],"However,":[18],"this":[19],"convenience":[20],"accompanied":[22],"by":[23,103],"a":[24,93,160],"mounting":[25],"threat":[26],"to":[27,34,41,141,168,218],"privacy.":[28],"The":[29],"DH":[30,52,85,105,155,183],"model":[31,194],"possesses":[32],"vulnerability":[33],"adversarial":[35,49,82,173],"attacks,":[36],"which":[37],"can":[38],"be":[39],"leveraged":[40],"prevent":[42],"the":[43,66,73,76,98,109,120,126,148,203,222,261,265],"of":[45,128,151,234,264],"private":[46],"images.":[47],"Current":[48],"attacks":[50],"on":[51,56,178],"models":[53,106,156,184],"focus":[55],"individual":[57],"images":[58,91],"or":[59],"specific":[60],"categories,":[61],"lacking":[62],"universal":[63],"perturbations":[64],"entire":[67],"hashing":[68],"dataset.":[69],"This":[70],"paper":[71],"introduces":[72],"UTAP":[74,114,204,223,266],"series,":[75],"first":[77],"universal,":[78],"transferable,":[79],"robust":[81],"perturbation":[83],"against":[84,275],"retrieval,":[88],"safeguarding":[89],"all":[90,242],"with":[92,245],"single":[94],"perturbation.":[95],"We":[96],"explore":[97],"relationships":[99],"between":[100],"clusters":[101],"learned":[102],"different":[104],"define":[108],"optimization":[110],"goal":[111],"optimizing":[113],"series":[115,205,224,267],"as":[116],"moving":[117],"away":[118],"from":[119],"voted":[121],"overall":[122],"hashcenter.":[123],"To":[124],"alleviate":[125],"challenges":[127],"single-objective":[129],"optimization,":[130],"we":[131,146],"randomly":[132],"vote":[133],"sub-cluster":[135],"centers":[136],"propose":[138],"sub-task-based":[139],"meta-learning":[140],"aid":[142],"global":[143],"optimization.":[144],"Furthermore,":[145],"dissect":[147],"functional":[149],"roles":[150],"key":[152],"components":[153],"introduce":[158],"UTAP++,":[159],"feature-hashing":[161],"two-stage":[162],"attack":[163],"that":[164,202],"readily":[166],"adaptable":[167],"cross-model":[169],"cross-scheme":[171],"ensemble":[172],"attacks.":[174],"Extensive":[175],"experiments":[176],"conducted":[177],"renowned":[179],"face":[180],"datasets":[181],"under":[185],"varied":[186],"complex":[187],"scenarios,":[188],"encompassing":[189],"cross-image,":[190],"cross-model,":[191],"cross-bit,":[192],"cross-algorithm,":[193],"ensemble,":[195,197],"algorithm":[196],"compression,":[200],"reveal":[201],"demonstrate":[206],"remarkable":[207],"universality,":[208],"transferability,":[209],"robustness":[211,250],"preventing":[213],"retrieval.":[216,279],"Compared":[217],"existing":[219],"state-of-the-art":[220],"methods,":[221],"excel":[225],"white-box":[227,253],"settings":[228],"exhibits":[230],"significant":[231],"transferability":[232],"improvements":[233,251],"<inline-formula":[235],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[236],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[237],"<tex-math":[238],"notation=\"LaTeX\">$10\\%-70\\%$":[239],"</tex-math></inline-formula>":[240],"black-box":[243,255],"settings,":[244,256],"20%":[246],"55%":[248],"average":[249],"respectively.":[257],"These":[258],"findings":[259],"underscore":[260],"practical":[262],"value":[263],"real-world,":[269],"presenting":[270],"novel":[271],"effective":[272],"defense":[273],"strategies":[274],"unauthorized":[276]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2025-02-28T00:00:00"}
