{"id":"https://openalex.org/W4416549539","doi":"https://doi.org/10.1145/3719027.3760742","title":"Poster: The Art of Deception: Crafting Chimera Images for Covert and Robust Semantic Poisoning Attacks","display_name":"Poster: The Art of Deception: Crafting Chimera Images for Covert and Robust Semantic Poisoning Attacks","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416549539","doi":"https://doi.org/10.1145/3719027.3760742"},"language":null,"primary_location":{"id":"doi:10.1145/3719027.3760742","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3760742","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3760742","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3760742","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100412814","display_name":"Lin Li","orcid":"https://orcid.org/0000-0001-7497-9002"},"institutions":[{"id":"https://openalex.org/I66809481","display_name":"Southern Cross University","ror":"https://ror.org/001xkv632","country_code":"AU","type":"education","lineage":["https://openalex.org/I66809481"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Lin Li","raw_affiliation_strings":["Southern Cross University, Gold Coast, Australia"],"affiliations":[{"raw_affiliation_string":"Southern Cross University, Gold Coast, Australia","institution_ids":["https://openalex.org/I66809481"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040772796","display_name":"Youyang Qu","orcid":"https://orcid.org/0000-0002-2944-4647"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Youyang Qu","raw_affiliation_strings":["CSIRO's Data61, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"CSIRO's Data61, Melbourne, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051951717","display_name":"Jiayang Ao","orcid":"https://orcid.org/0000-0001-6416-1215"},"institutions":[{"id":"https://openalex.org/I165779595","display_name":"The University of Melbourne","ror":"https://ror.org/01ej9dk98","country_code":"AU","type":"education","lineage":["https://openalex.org/I165779595"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jiayang Ao","raw_affiliation_strings":["The University of Melbourne, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"The University of Melbourne, Melbourne, Australia","institution_ids":["https://openalex.org/I165779595"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075722123","display_name":"Ming Ding","orcid":"https://orcid.org/0000-0002-3690-0321"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ming Ding","raw_affiliation_strings":["CSIRO's Data61, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"CSIRO's Data61, Sydney, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114860210","display_name":"Chao Chen","orcid":"https://orcid.org/0000-0003-1355-3870"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Chao Chen","raw_affiliation_strings":["RMIT University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"RMIT University, Melbourne, Australia","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044019139","display_name":"Jun Zhang","orcid":"https://orcid.org/0000-0002-2189-7801"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jun Zhang","raw_affiliation_strings":["Swinburne University of Technology, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Swinburne University of Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I57093077"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100412814"],"corresponding_institution_ids":["https://openalex.org/I66809481"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19862942,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"4833","last_page":"4835"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.43619999289512634,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.43619999289512634,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.15070000290870667,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.10530000180006027,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6819999814033508},{"id":"https://openalex.org/keywords/snapshot","display_name":"Snapshot (computer storage)","score":0.5055000185966492},{"id":"https://openalex.org/keywords/chimera","display_name":"Chimera (genetics)","score":0.5040000081062317},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.46619999408721924},{"id":"https://openalex.org/keywords/generative-model","display_name":"Generative model","score":0.38519999384880066}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7092999815940857},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6819999814033508},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5871000289916992},{"id":"https://openalex.org/C55282118","wikidata":"https://www.wikidata.org/wiki/Q252683","display_name":"Snapshot (computer storage)","level":2,"score":0.5055000185966492},{"id":"https://openalex.org/C30278631","wikidata":"https://www.wikidata.org/wiki/Q281721","display_name":"Chimera (genetics)","level":3,"score":0.5040000081062317},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.46619999408721924},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.38519999384880066},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3806000053882599},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37040001153945923},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.3582000136375427},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3476000130176544},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2955000102519989},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2915000021457672}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3719027.3760742","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3760742","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3760742","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3719027.3760742","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3760742","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3760742","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416549539.pdf","grobid_xml":"https://content.openalex.org/works/W4416549539.grobid-xml"},"referenced_works_count":3,"referenced_works":["https://openalex.org/W3128839796","https://openalex.org/W4288758078","https://openalex.org/W4312933868"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,13,83,100,105,108,113,129,142,150],"exponential":[2],"surge":[3],"in":[4],"media":[5],"data":[6,24,49],"volumes":[7],"and":[8,21,46,95,118],"their":[9],"growing":[10],"intrinsic":[11],"value,":[12],"landscape":[14],"has":[15],"become":[16],"increasingly":[17],"susceptible":[18],"to":[19,43,52,66,122],"persistent":[20],"strategically":[22],"designed":[23],"poisoning":[25],"attacks":[26],"targeting":[27],"these":[28],"valuable":[29],"assets.":[30],"In":[31],"this":[32],"work,":[33],"we":[34],"propose":[35],"a":[36,137],"novel":[37],"approach":[38],"leveraging":[39],"generative":[40,132],"AI":[41,133],"techniques":[42],"craft":[44],"covert":[45],"robust":[47],"poisonous":[48,152],"samples,":[50],"referred":[51],"as":[53,136],"Chimera":[54,153],"Images.":[55],"These":[56,74],"images":[57],"seamlessly":[58],"blend":[59],"visual":[60],"features":[61],"from":[62],"two":[63],"target":[64],"classes":[65],"generate":[67],"hybrid":[68],"objects":[69],"that":[70,99,141],"preserve":[71],"appearance":[72],"fidelity.":[73],"''normal''":[75],"samples":[76],"with":[77],"correct":[78],"labels":[79],"can":[80],"subtly":[81],"distort":[82],"model's":[84],"decision":[85],"boundary":[86],"without":[87],"raising":[88],"suspicion.":[89],"Extensive":[90],"experimental":[91],"results":[92],"on":[93],"CIFAR-10":[94],"Flowers":[96],"datasets":[97],"demonstrate":[98],"proposed":[101],"method":[102],"i)":[103],"reduces":[104],"accuracy":[106],"of":[107,115,131],"targeted":[109],"class,":[110],"ii)":[111],"maintains":[112],"performance":[114],"other":[116],"classes,":[117],"iii)":[119],"exhibits":[120],"immunity":[121],"state-of-the-art":[123],"defence":[124,138],"strategies.":[125],"We":[126],"also":[127],"explore":[128],"usage":[130],"content":[134],"detection":[135],"mechanism,":[139],"demonstrating":[140],"recently":[143],"discovered":[144],"snapshot":[145],"technique":[146],"is":[147],"ineffective":[148],"against":[149],"AI-generated":[151],"samples.":[154]},"counts_by_year":[],"updated_date":"2026-03-11T06:11:40.159057","created_date":"2025-11-23T00:00:00"}
