{"id":"https://openalex.org/W4399423396","doi":"https://doi.org/10.1145/3652583.3658062","title":"Targeted Universal Adversarial Attack on Deep Hash Networks","display_name":"Targeted Universal Adversarial Attack on Deep Hash Networks","publication_year":2024,"publication_date":"2024-05-30","ids":{"openalex":"https://openalex.org/W4399423396","doi":"https://doi.org/10.1145/3652583.3658062"},"language":"en","primary_location":{"id":"doi:10.1145/3652583.3658062","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3652583.3658062","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3652583.3658062","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 International Conference on Multimedia Retrieval","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3652583.3658062","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080764596","display_name":"Fanlei Meng","orcid":"https://orcid.org/0000-0001-7895-9236"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fanlei Meng","raw_affiliation_strings":["Ocean University of China, QingDao, China"],"raw_orcid":"https://orcid.org/0000-0001-7895-9236","affiliations":[{"raw_affiliation_string":"Ocean University of China, QingDao, China","institution_ids":["https://openalex.org/I59028903"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053036479","display_name":"Xiangru Chen","orcid":"https://orcid.org/0009-0002-4993-9345"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangru Chen","raw_affiliation_strings":["Ocean University of China, Qingdao, China"],"raw_orcid":"https://orcid.org/0009-0002-4993-9345","affiliations":[{"raw_affiliation_string":"Ocean University of China, Qingdao, China","institution_ids":["https://openalex.org/I59028903"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074890965","display_name":"Yuan Cao","orcid":"https://orcid.org/0000-0002-1445-8210"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Cao","raw_affiliation_strings":["Ocean University of China, Qingdao, China"],"raw_orcid":"https://orcid.org/0000-0002-1445-8210","affiliations":[{"raw_affiliation_string":"Ocean University of China, Qingdao, China","institution_ids":["https://openalex.org/I59028903"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5080764596"],"corresponding_institution_ids":["https://openalex.org/I59028903"],"apc_list":null,"apc_paid":null,"fwci":0.6623,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.73209365,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"165","last_page":"174"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.7485781311988831},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6821050643920898},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5425212979316711},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5419020056724548},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.4863927662372589},{"id":"https://openalex.org/keywords/cosine-similarity","display_name":"Cosine similarity","score":0.4822745621204376},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3065420389175415},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.18376865983009338},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15754550695419312}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7485781311988831},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6821050643920898},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5425212979316711},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5419020056724548},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.4863927662372589},{"id":"https://openalex.org/C2780762811","wikidata":"https://www.wikidata.org/wiki/Q1784941","display_name":"Cosine similarity","level":3,"score":0.4822745621204376},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3065420389175415},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.18376865983009338},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15754550695419312}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3652583.3658062","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3652583.3658062","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3652583.3658062","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 International Conference on Multimedia Retrieval","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3652583.3658062","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3652583.3658062","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3652583.3658062","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 International Conference on Multimedia Retrieval","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4399423396.pdf"},"referenced_works_count":51,"referenced_works":["https://openalex.org/W2007972815","https://openalex.org/W2086504823","https://openalex.org/W2147717514","https://openalex.org/W2155803963","https://openalex.org/W2186222003","https://openalex.org/W2194775991","https://openalex.org/W2243397390","https://openalex.org/W2266728343","https://openalex.org/W2461086877","https://openalex.org/W2543927648","https://openalex.org/W2565611351","https://openalex.org/W2594227027","https://openalex.org/W2602753196","https://openalex.org/W2618530766","https://openalex.org/W2746600820","https://openalex.org/W2799245683","https://openalex.org/W2808282156","https://openalex.org/W2809153957","https://openalex.org/W2904169782","https://openalex.org/W2914393402","https://openalex.org/W2947874337","https://openalex.org/W2963288100","https://openalex.org/W2963767194","https://openalex.org/W2963809642","https://openalex.org/W2963855547","https://openalex.org/W2984942115","https://openalex.org/W2998421476","https://openalex.org/W2998702515","https://openalex.org/W3009756253","https://openalex.org/W3034239448","https://openalex.org/W3034643863","https://openalex.org/W3106412272","https://openalex.org/W3108980562","https://openalex.org/W3140461372","https://openalex.org/W3155075829","https://openalex.org/W3175311435","https://openalex.org/W3175328093","https://openalex.org/W3188749092","https://openalex.org/W3197447668","https://openalex.org/W3198892687","https://openalex.org/W3206937959","https://openalex.org/W4210885000","https://openalex.org/W4226172762","https://openalex.org/W4226283811","https://openalex.org/W4287902759","https://openalex.org/W4304099366","https://openalex.org/W4322730895","https://openalex.org/W4323644273","https://openalex.org/W4367047323","https://openalex.org/W4382469100","https://openalex.org/W4387969331"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W2965546495","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W2619127353","https://openalex.org/W3023219121","https://openalex.org/W2035244949"],"abstract_inverted_index":{"Deep":[0],"hash":[1,28,50,85,159,195],"networks":[2,29],"have":[3],"garnered":[4],"significant":[5],"attention":[6],"due":[7],"to":[8,13,32,67,106,137,148],"their":[9],"efficiency":[10],"and":[11,96,131,165,182],"ability":[12],"learn":[14,138],"discriminative":[15],"embeddings":[16],"for":[17,112],"approximate":[18],"nearest":[19],"neighbor":[20],"search.":[21],"However,":[22],"it":[23,52],"is":[24,36,104],"observed":[25],"that":[26],"deep":[27,49,84,194],"are":[30,65,146],"vulnerable":[31],"adversarial":[33,62,80,100,140,163],"interference,":[34],"which":[35,64],"an":[37],"important":[38],"security":[39],"problem.":[40],"Despite":[41],"the":[42,68,113,127,135,143,150,154,158,162,166,176],"growing":[43],"interest":[44],"in":[45],"targeted":[46,178,190],"attack":[47,179,191],"on":[48,59,83,171,193],"networks,":[51],"suffers":[53],"from":[54],"a":[55,76,94,97,118],"scarcity":[56],"of":[57,90,161,184],"research":[58],"generating":[60],"universal":[61,98,139],"perturbations":[63],"unrelated":[66],"specific":[69],"images.":[70],"In":[71],"this":[72],"paper,":[73],"we":[74,125],"introduce":[75],"novel":[77],"<u>T</u>argeted":[78],"<u>U</u>niversal":[79],"<u>A</u>ttack":[81],"(TUA)":[82],"networks.":[86,196],"Our":[87],"framework":[88],"consists":[89],"two":[91],"key":[92],"components:":[93],"ReferenceNet":[95,103],"generative":[99],"network.":[101],"Specifically,":[102],"designed":[105],"generate":[107],"category-level":[108],"representative":[109],"reference":[110,122,144,167],"codes":[111,145,160],"target":[114,132],"labels":[115,133],"by":[116,152],"introducing":[117],"cosine":[119],"similarity":[120],"based":[121],"loss.":[123],"Additionally,":[124],"feed":[126],"fixed":[128],"random":[129],"noise":[130],"into":[134],"generator":[136,151],"perturbations.":[141],"Particularly,":[142],"used":[147],"optimize":[149],"minimizing":[153],"Hamming":[155],"distances":[156],"between":[157],"examples":[164],"codes.":[168],"Extensive":[169],"experiments":[170],"three":[172],"common":[173],"datasets":[174],"validate":[175],"superior":[177],"performance,":[180],"transferability,":[181],"universality":[183],"our":[185],"method":[186],"compared":[187],"with":[188],"state-of-the-art":[189],"methods":[192]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
