{"id":"https://openalex.org/W7117309717","doi":"https://doi.org/10.1109/tifs.2025.3648873","title":"Exploiting Shared Adversarial Features for Dynamic Attacks in Large Vision-Language Models","display_name":"Exploiting Shared Adversarial Features for Dynamic Attacks in Large Vision-Language Models","publication_year":2025,"publication_date":"2025-12-26","ids":{"openalex":"https://openalex.org/W7117309717","doi":"https://doi.org/10.1109/tifs.2025.3648873"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2025.3648873","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3648873","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018343275","display_name":"Yaguan Qian","orcid":null},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yaguan Qian","raw_affiliation_strings":["School of Artificial Intelligence and Information Engineering, Zhejiang University of Science and Technology, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence and Information Engineering, Zhejiang University of Science and Technology, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121308068","display_name":"Xucheng Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xucheng Zhu","raw_affiliation_strings":["School of Artificial Intelligence and Information Engineering, Zhejiang University of Science and Technology, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence and Information Engineering, Zhejiang University of Science and Technology, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Qiqi Bao","orcid":"https://orcid.org/0009-0004-1703-6090"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiqi Bao","raw_affiliation_strings":["School of Artificial Intelligence and Information Engineering, Zhejiang University of Science and Technology, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence and Information Engineering, Zhejiang University of Science and Technology, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Fei Yu","orcid":"https://orcid.org/0000-0001-8970-6269"},"institutions":[{"id":"https://openalex.org/I2898894","display_name":"Liaoning University of Technology","ror":"https://ror.org/05ay23762","country_code":"CN","type":"education","lineage":["https://openalex.org/I2898894"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Yu","raw_affiliation_strings":["School of Electronic and Information Engineering, Liaoning University of Technology, Jinzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Liaoning University of Technology, Jinzhou, China","institution_ids":["https://openalex.org/I2898894"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5117111832","display_name":"Shouling Ji","orcid":null},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shouling Ji","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040547391","display_name":"Zhaoquan Gu","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaoquan Gu","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121315496","display_name":"Wei Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104189020","display_name":"Bin Wang","orcid":"https://orcid.org/0009-0007-3155-3790"},"institutions":[{"id":"https://openalex.org/I4210123185","display_name":"Zhejiang Lab","ror":"https://ror.org/02m2h7991","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210123185"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Wang","raw_affiliation_strings":["Zhejiang Key Laboratory of Artificial Intelligence of Things (AIoT) Network and Data Security, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang Key Laboratory of Artificial Intelligence of Things (AIoT) Network and Data Security, Hangzhou, China","institution_ids":["https://openalex.org/I4210123185"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109299788","display_name":"Zhen Lei","orcid":"https://orcid.org/0000-0002-0791-189X"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210094879","display_name":"Shandong Institute of Automation","ror":"https://ror.org/00qdtba35","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210094879","https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Lei","raw_affiliation_strings":["Center for Biometrics and Security Research and the National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Center for Biometrics and Security Research and the National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210094879","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5018343275"],"corresponding_institution_ids":["https://openalex.org/I168879160"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.8111127,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"592","last_page":"607"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8970000147819519,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8970000147819519,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.019099999219179153,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.009200000204145908,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8015000224113464},{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.7080000042915344},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.6215999722480774},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5885999798774719},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.5806999802589417},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.42649999260902405},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4203000068664551}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8955000042915344},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8015000224113464},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.7080000042915344},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.6215999722480774},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5885999798774719},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.5806999802589417},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4634000062942505},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43059998750686646},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.42649999260902405},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4203000068664551},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4011000096797943},{"id":"https://openalex.org/C61272859","wikidata":"https://www.wikidata.org/wiki/Q7834031","display_name":"Transferability","level":3,"score":0.37790000438690186},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.3172999918460846},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.31709998846054077},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.3156000077724457},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.3005000054836273},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.29440000653266907},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2824999988079071},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.25459998846054077}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3648873","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3648873","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1791217396","display_name":null,"funder_award_id":"LQN25F010018","funder_id":"https://openalex.org/F4320321223","funder_display_name":"Gyeongnam National University of Science and Technology"},{"id":"https://openalex.org/G2902468357","display_name":null,"funder_award_id":"62372137","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3859458567","display_name":null,"funder_award_id":"2022YFB3102100","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4930386054","display_name":null,"funder_award_id":"62472335","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5681569201","display_name":null,"funder_award_id":"2024yjskc19","funder_id":"https://openalex.org/F4320321223","funder_display_name":"Gyeongnam National University of Science and Technology"},{"id":"https://openalex.org/G6047521378","display_name":null,"funder_award_id":"62476250","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6475258168","display_name":null,"funder_award_id":"62506339","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321223","display_name":"Gyeongnam National University of Science and Technology","ror":"https://ror.org/059r50h13"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1861492603","https://openalex.org/W1933349210","https://openalex.org/W2194775991","https://openalex.org/W2336525064","https://openalex.org/W2560730294","https://openalex.org/W2568262903","https://openalex.org/W2746600820","https://openalex.org/W2774644650","https://openalex.org/W2896078964","https://openalex.org/W2947312908","https://openalex.org/W2984699060","https://openalex.org/W2991496458","https://openalex.org/W3034176567","https://openalex.org/W3092292656","https://openalex.org/W3127807678","https://openalex.org/W4283317927","https://openalex.org/W4312331087","https://openalex.org/W4312648479","https://openalex.org/W4312790346","https://openalex.org/W4385245566","https://openalex.org/W4385574358","https://openalex.org/W4386076522","https://openalex.org/W4390190425","https://openalex.org/W4390872450","https://openalex.org/W4390872540","https://openalex.org/W4390889737","https://openalex.org/W4391494845","https://openalex.org/W4393159851","https://openalex.org/W4400524868","https://openalex.org/W4400771068","https://openalex.org/W4402716179","https://openalex.org/W4402727057","https://openalex.org/W4402754002","https://openalex.org/W4402774109","https://openalex.org/W4402959346","https://openalex.org/W4403791703","https://openalex.org/W4405308254","https://openalex.org/W4413392399"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,42,84,92,111,146,158,169],"rapid":[2],"development":[3],"of":[4,12,88,115,148,155],"Large":[5,13],"Language":[6],"Models":[7,15],"(LLMs),":[8],"an":[9,152],"increasing":[10],"number":[11],"Visual-Language":[14],"(LVLMs)":[16],"have":[17],"achieved":[18],"unprecedented":[19],"performance":[20,187],"in":[21,157],"response":[22],"generation.":[23],"Recent":[24],"work":[25],"shows":[26],"that":[27,98,167,181],"LVLMs":[28,164],"are":[29,99,118,132],"vulnerable":[30],"to":[31,39,41,61,102,110,121,140,189],"adversarial":[32,103],"attacks.":[33],"However,":[34],"many":[35],"existing":[36,190],"methods":[37,191],"tend":[38],"overfit":[40],"source":[43],"model":[44,176],"by":[45],"overemphasizing":[46],"specific":[47],"features,":[48],"which":[49],"compromises":[50],"their":[51],"transferability.":[52],"Other":[53],"approaches":[54],"suffer":[55],"from":[56,125,145],"reduced":[57],"attack":[58,186],"effectiveness":[59],"due":[60,109],"insufficient":[62],"differentiation":[63],"between":[64],"features.":[65],"In":[66],"this":[67,142],"paper,":[68],"we":[69,90,150],"propose":[70],"a":[71,136],"novel":[72],"transfer-based":[73],"black-box":[74],"untargeted":[75],"attack\u2014Shared":[76],"Adversarial":[77],"Feature":[78],"(SAF)":[79],"dynamic":[80,137],"attack.":[81],"By":[82],"exploring":[83],"feature":[85],"extraction":[86],"patterns":[87],"LVLMs,":[89,116],"identify":[91],"features":[93,131],"shared":[94],"among":[95],"various":[96],"models":[97],"most":[100],"susceptible":[101],"attacks":[104],"and":[105,161,165,196],"disrupt":[106],"them.":[107],"Moreover,":[108],"powerful":[112],"attention":[113],"mechanisms":[114],"they":[117],"still":[119],"able":[120],"extract":[122],"similar":[123],"semantics":[124],"perturbed":[126],"images,":[127],"even":[128],"when":[129],"primary":[130],"disrupted.":[133],"We":[134],"design":[135],"update":[138],"strategy":[139],"address":[141],"challenge.":[143],"Finally,":[144],"perspective":[147],"SAF,":[149],"conduct":[151],"in-depth":[153],"analysis":[154],"vulnerabilities":[156],"vision":[159],"encoder":[160],"projector":[162,170],"within":[163],"find":[166],"attacking":[168],"exhibits":[171,184],"stronger":[172],"transferability":[173],"across":[174,192],"heterogeneous":[175],"architectures.":[177],"Extensive":[178],"experiments":[179],"show":[180],"our":[182],"method":[183],"superior":[185],"compared":[188],"different":[193],"models,":[194],"datasets,":[195],"tasks.":[197],"The":[198],"code":[199],"will":[200],"be":[201],"publicly":[202],"available":[203],"after":[204],"publication.":[205]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-26T00:00:00"}
