{"id":"https://openalex.org/W4388858740","doi":"https://doi.org/10.1145/3576915.3624390","title":"Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning","display_name":"Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning","publication_year":2023,"publication_date":"2023-11-15","ids":{"openalex":"https://openalex.org/W4388858740","doi":"https://doi.org/10.1145/3576915.3624390"},"language":"en","primary_location":{"id":"doi:10.1145/3576915.3624390","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3576915.3624390","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043791595","display_name":"Xianbo Mo","orcid":"https://orcid.org/0000-0001-9198-5041"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xianbo Mo","raw_affiliation_strings":["Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0001-9198-5041","affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023503629","display_name":"Shunquan Tan","orcid":"https://orcid.org/0000-0002-7457-3691"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shunquan Tan","raw_affiliation_strings":["Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0002-7457-3691","affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100365163","display_name":"Bin Li","orcid":"https://orcid.org/0000-0002-2613-5451"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Li","raw_affiliation_strings":["Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0002-2613-5451","affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047964483","display_name":"Jiwu Huang","orcid":"https://orcid.org/0000-0002-7625-5689"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwu Huang","raw_affiliation_strings":["Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0002-7625-5689","affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5043791595"],"corresponding_institution_ids":["https://openalex.org/I180726961"],"apc_list":null,"apc_paid":null,"fwci":0.1151,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.4309012,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"3552","last_page":"3554"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9846000075340271,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.816260576248169},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.7697356939315796},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7231407165527344},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.6502940058708191},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.569652795791626},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4787016212940216},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4652270972728729},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.44735467433929443},{"id":"https://openalex.org/keywords/markov-decision-process","display_name":"Markov decision process","score":0.4122535288333893},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.35462555289268494},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.3179362416267395},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09301590919494629}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.816260576248169},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.7697356939315796},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7231407165527344},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.6502940058708191},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.569652795791626},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4787016212940216},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4652270972728729},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.44735467433929443},{"id":"https://openalex.org/C106189395","wikidata":"https://www.wikidata.org/wiki/Q176789","display_name":"Markov decision process","level":3,"score":0.4122535288333893},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35462555289268494},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.3179362416267395},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09301590919494629},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3576915.3624390","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3576915.3624390","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.800000011920929,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2384910493","display_name":null,"funder_award_id":"U19B2022, 62272314, U22B2047, 62072313","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1901129140","https://openalex.org/W1983586459","https://openalex.org/W2169439181","https://openalex.org/W2260756217","https://openalex.org/W2946948417","https://openalex.org/W3096831136","https://openalex.org/W3197106219","https://openalex.org/W4206589716","https://openalex.org/W4287752693","https://openalex.org/W6637162671"],"related_works":["https://openalex.org/W4400868993","https://openalex.org/W3096874164","https://openalex.org/W1985560493","https://openalex.org/W2937181779","https://openalex.org/W2386410636","https://openalex.org/W2357975469","https://openalex.org/W2145363145","https://openalex.org/W1626977535","https://openalex.org/W2341346307","https://openalex.org/W3168977894"],"abstract_inverted_index":{"Recently,":[0],"deep":[1],"learning":[2],"has":[3],"been":[4],"widely":[5],"used":[6],"in":[7,145],"forensics":[8],"tools":[9],"to":[10,19,55,112],"detect":[11],"and":[12,38,96],"localize":[13],"forgery":[14,49,137],"images.":[15,50,149],"However,":[16],"its":[17],"susceptibility":[18],"adversarial":[20,48,129],"attacks":[21,88],"highlights":[22],"the":[23,26,45,57,71,85,91,101,119,146],"need":[24],"for":[25,44],"exploration":[27],"of":[28,47,60,73,87,104,121,134],"anti-forensics":[29,41,148],"research.":[30],"To":[31,99],"achieve":[32],"this,":[33],"we":[34],"introduce":[35,78],"an":[36,107],"innovative":[37],"query-efficient":[39],"black-box":[40],"framework":[42,52],"tailored":[43],"generation":[46],"This":[51],"is":[53,110],"designed":[54],"simulate":[56],"query":[58,94,102],"dynamics":[59],"online":[61],"forensic":[62],"services,":[63],"utilizing":[64],"a":[65,79,132],"Markov":[66],"Decision":[67],"Process":[68],"formulation":[69],"within":[70],"paradigm":[72],"reinforcement":[74],"learning.":[75],"We":[76],"further":[77],"novel":[80],"reward":[81],"function,":[82],"which":[83],"evaluates":[84],"efficacy":[86,120],"based":[89],"on":[90,131],"disjunction":[92],"between":[93],"results":[95],"attack":[97],"targets.":[98],"improve":[100],"efficiency":[103],"these":[105],"attacks,":[106],"actor-critic":[108],"algorithm":[109],"employed":[111],"maximize":[113],"cumulative":[114],"rewards.":[115],"Empirical":[116],"findings":[117],"substantiate":[118],"our":[122],"proposed":[123],"methodology.":[124],"Specifically,":[125],"it":[126],"demonstrates":[127],"pronounced":[128],"effects":[130],"range":[133],"prevailing":[135],"image":[136],"detectors,":[138],"while":[139],"ensuring":[140],"negligible":[141],"visually":[142],"perceptible":[143],"distortions":[144],"resultant":[147]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-05-09T13:55:54.758798","created_date":"2025-10-10T00:00:00"}
