{"id":"https://openalex.org/W4413392399","doi":"https://doi.org/10.1109/tdsc.2025.3601232","title":"A Multimodal Adversarial Attack Method via Frequency Domain Enhancement and Fine-Grained Cross-Modal Guidance","display_name":"A Multimodal Adversarial Attack Method via Frequency Domain Enhancement and Fine-Grained Cross-Modal Guidance","publication_year":2025,"publication_date":"2025-08-21","ids":{"openalex":"https://openalex.org/W4413392399","doi":"https://doi.org/10.1109/tdsc.2025.3601232"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3601232","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3601232","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057867117","display_name":"Yaguan Qian","orcid":"https://orcid.org/0000-0003-4056-9755"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yaguan Qian","raw_affiliation_strings":["School of Artificial Intelligence and Information Engineering, Zhejiang University of Science and Technology, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-4056-9755","affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence and Information Engineering, Zhejiang University of Science and Technology, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003557943","display_name":"Qiang Yu","orcid":"https://orcid.org/0000-0002-8454-0500"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinqin Yu","raw_affiliation_strings":["School of Artificial Intelligence and Information Engineering, Zhejiang University of Science and Technology, Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence and Information Engineering, Zhejiang University of Science and Technology, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Qiqi Bao","orcid":"https://orcid.org/0009-0004-1703-6090"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiqi Bao","raw_affiliation_strings":["School of Artificial Intelligence and Information Engineering, Zhejiang University of Science and Technology, Hangzhou, China"],"raw_orcid":"https://orcid.org/0009-0004-1703-6090","affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence and Information Engineering, Zhejiang University of Science and Technology, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058611515","display_name":"Shouling Ji","orcid":"https://orcid.org/0000-0003-4268-372X"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shouling Ji","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-4268-372X","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100777576","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0002-5974-1589"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China"],"raw_orcid":"https://orcid.org/0000-0002-5974-1589","affiliations":[{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108156794","display_name":"Bin Wang","orcid":"https://orcid.org/0000-0002-3790-2708"},"institutions":[{"id":"https://openalex.org/I4210123185","display_name":"Zhejiang Lab","ror":"https://ror.org/02m2h7991","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210123185"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Wang","raw_affiliation_strings":["Zhejiang Key Laboratory of Artificial Intelligence of Things (AIoT) Network and Data Security, Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Zhejiang Key Laboratory of Artificial Intelligence of Things (AIoT) Network and Data Security, Hangzhou, China","institution_ids":["https://openalex.org/I4210123185"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070856186","display_name":"Zhaoquan Gu","orcid":"https://orcid.org/0000-0001-7546-852X"},"institutions":[{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaoquan Gu","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0001-7546-852X","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China","institution_ids":["https://openalex.org/I158809036","https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109299788","display_name":"Zhen Lei","orcid":"https://orcid.org/0000-0002-0791-189X"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210094879","display_name":"Shandong Institute of Automation","ror":"https://ror.org/00qdtba35","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210094879","https://openalex.org/I4210142748"]},{"id":"https://openalex.org/I4210112150","display_name":"Institute of Automation","ror":"https://ror.org/022c3hy66","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210112150"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Lei","raw_affiliation_strings":["Center for Biometrics and Security Research and National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, Beijing, China","Center for Biometrics and Security Research &amp; National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-0791-189X","affiliations":[{"raw_affiliation_string":"Center for Biometrics and Security Research and National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210094879","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Center for Biometrics and Security Research &amp; National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210112150","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5057867117"],"corresponding_institution_ids":["https://openalex.org/I168879160"],"apc_list":null,"apc_paid":null,"fwci":19.151,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.98876892,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"22","issue":"6","first_page":"7877","last_page":"7889"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12389","display_name":"Infrared Target Detection Methodologies","score":0.8787999749183655,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12389","display_name":"Infrared Target Detection Methodologies","score":0.8787999749183655,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13371","display_name":"Military Defense Systems Analysis","score":0.8296999931335449,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12153","display_name":"Advanced Optical Sensing Technologies","score":0.8234000205993652,"subfield":{"id":"https://openalex.org/subfields/3105","display_name":"Instrumentation"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7440004348754883},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7283039093017578},{"id":"https://openalex.org/keywords/modal","display_name":"Modal","score":0.6617326736450195},{"id":"https://openalex.org/keywords/frequency-domain","display_name":"Frequency domain","score":0.6061358451843262},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4176931381225586},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2227785885334015},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.17942044138908386},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08376923203468323}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7440004348754883},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7283039093017578},{"id":"https://openalex.org/C71139939","wikidata":"https://www.wikidata.org/wiki/Q910194","display_name":"Modal","level":2,"score":0.6617326736450195},{"id":"https://openalex.org/C19118579","wikidata":"https://www.wikidata.org/wiki/Q786423","display_name":"Frequency domain","level":2,"score":0.6061358451843262},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4176931381225586},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2227785885334015},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.17942044138908386},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08376923203468323},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C188027245","wikidata":"https://www.wikidata.org/wiki/Q750446","display_name":"Polymer chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3601232","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3601232","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1773149199","https://openalex.org/W1861492603","https://openalex.org/W1956340063","https://openalex.org/W2101105183","https://openalex.org/W2145287260","https://openalex.org/W2489434015","https://openalex.org/W2506483933","https://openalex.org/W2803259101","https://openalex.org/W2896078964","https://openalex.org/W2952524542","https://openalex.org/W2960655175","https://openalex.org/W2962681491","https://openalex.org/W2962764817","https://openalex.org/W2965496811","https://openalex.org/W3034175346","https://openalex.org/W3035454331","https://openalex.org/W3101449015","https://openalex.org/W4225832925","https://openalex.org/W4283317927","https://openalex.org/W4312877428","https://openalex.org/W4313178921","https://openalex.org/W4390872450","https://openalex.org/W4390889737","https://openalex.org/W4394625547","https://openalex.org/W4400771068","https://openalex.org/W4402288734","https://openalex.org/W4402959346","https://openalex.org/W4411336749"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W2327611326","https://openalex.org/W3151456821"],"abstract_inverted_index":{"Vision-language":[0],"pretraining":[1],"(VLP)":[2],"models":[3,128],"have":[4],"demonstrated":[5],"outstanding":[6],"performance":[7,121],"in":[8],"image-text":[9,32,99],"understanding":[10],"tasks":[11,136],"but":[12],"remain":[13],"highly":[14],"susceptible":[15],"to":[16,44,47,78,97],"transferable":[17],"adversarial":[18,25,67,87],"attacks.":[19,56,107],"While":[20],"ensemble-based":[21],"guided":[22],"attacks":[23],"improve":[24],"transferability":[26,104,118],"by":[27],"increasing":[28],"the":[29,52,84,103,112,138],"diversity":[30],"of":[31,55,75,86,105],"pairs,":[33],"they":[34],"primarily":[35],"rely":[36],"on":[37,137],"spatial-domain":[38],"data":[39],"augmentation,":[40],"which":[41],"can":[42],"lead":[43],"model":[45],"overfitting":[46],"image":[48],"details":[49],"and":[50,82,119,129,141],"limit":[51],"generalization":[53,120],"capability":[54],"To":[57],"address":[58],"this":[59,61],"limitation,":[60],"study":[62],"proposes":[63],"a":[64,90],"frequency-domain":[65],"adjustment-based":[66],"attack":[68,117],"method":[69,114],"that":[70,111],"modifies":[71],"specific":[72],"frequency":[73],"components":[74],"input":[76],"images":[77],"reduce":[79],"detail":[80],"interference":[81],"enhance":[83],"stability":[85],"examples.":[88],"Additionally,":[89],"fine-grained":[91],"feature":[92],"extraction":[93],"technique":[94],"is":[95],"introduced":[96],"optimize":[98],"alignment,":[100],"further":[101],"improving":[102],"cross-modal":[106],"Experimental":[108],"results":[109],"demonstrate":[110],"proposed":[113],"achieves":[115],"superior":[116],"across":[122],"two":[123],"major":[124],"VLP":[125],"architectures,":[126],"fusion":[127],"alignment":[130],"models,":[131],"as":[132,134],"well":[133],"multiple":[135],"Flickr30":[139],"K":[140],"MSCOCO":[142],"datasets.":[143]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
