{"id":"https://openalex.org/W4411635575","doi":"https://doi.org/10.1145/3731715.3733367","title":"Joint Adversarial Purification: Mitigating the Threat of Multimodal Adversarial Examples","display_name":"Joint Adversarial Purification: Mitigating the Threat of Multimodal Adversarial Examples","publication_year":2025,"publication_date":"2025-06-25","ids":{"openalex":"https://openalex.org/W4411635575","doi":"https://doi.org/10.1145/3731715.3733367"},"language":"en","primary_location":{"id":"doi:10.1145/3731715.3733367","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3731715.3733367","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 International Conference on Multimedia Retrieval","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100438918","display_name":"Qin Li","orcid":null},"institutions":[{"id":"https://openalex.org/I16365422","display_name":"Hefei University of Technology","ror":"https://ror.org/02czkny70","country_code":"CN","type":"education","lineage":["https://openalex.org/I16365422"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qin Li","raw_affiliation_strings":["Hefei University of Technology, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Hefei University of Technology, Hefei, China","institution_ids":["https://openalex.org/I16365422"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035229016","display_name":"Youze Wang","orcid":"https://orcid.org/0009-0003-5621-6310"},"institutions":[{"id":"https://openalex.org/I16365422","display_name":"Hefei University of Technology","ror":"https://ror.org/02czkny70","country_code":"CN","type":"education","lineage":["https://openalex.org/I16365422"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Youze Wang","raw_affiliation_strings":["Hefei University of Technology, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Hefei University of Technology, Hefei, China","institution_ids":["https://openalex.org/I16365422"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058191990","display_name":"Wenbo Hu","orcid":"https://orcid.org/0000-0002-0639-2012"},"institutions":[{"id":"https://openalex.org/I16365422","display_name":"Hefei University of Technology","ror":"https://ror.org/02czkny70","country_code":"CN","type":"education","lineage":["https://openalex.org/I16365422"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenbo Hu","raw_affiliation_strings":["Hefei University of Technology, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Hefei University of Technology, Hefei, China","institution_ids":["https://openalex.org/I16365422"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051332325","display_name":"Richang Hong","orcid":"https://orcid.org/0000-0001-5461-3986"},"institutions":[{"id":"https://openalex.org/I16365422","display_name":"Hefei University of Technology","ror":"https://ror.org/02czkny70","country_code":"CN","type":"education","lineage":["https://openalex.org/I16365422"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Richang Hong","raw_affiliation_strings":["Hefei University of Technology, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Hefei University of Technology, Hefei, China","institution_ids":["https://openalex.org/I16365422"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100438918"],"corresponding_institution_ids":["https://openalex.org/I16365422"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07974342,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"779","last_page":"787"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.965399980545044,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.9569588899612427},{"id":"https://openalex.org/keywords/joint","display_name":"Joint (building)","score":0.7846840620040894},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6788995265960693},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42208653688430786},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40200552344322205},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1740821897983551}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.9569588899612427},{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.7846840620040894},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6788995265960693},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42208653688430786},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40200552344322205},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1740821897983551},{"id":"https://openalex.org/C170154142","wikidata":"https://www.wikidata.org/wiki/Q150737","display_name":"Architectural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3731715.3733367","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3731715.3733367","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 International Conference on Multimedia Retrieval","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1773149199","https://openalex.org/W2194775991","https://openalex.org/W2994818707","https://openalex.org/W3035454331","https://openalex.org/W3035552787","https://openalex.org/W3171288285","https://openalex.org/W3173261519","https://openalex.org/W3187172219","https://openalex.org/W3201980333","https://openalex.org/W3206020652","https://openalex.org/W4283317927","https://openalex.org/W4312583258","https://openalex.org/W4312877428","https://openalex.org/W4313178921","https://openalex.org/W4319300158","https://openalex.org/W4389988150","https://openalex.org/W4390889737","https://openalex.org/W6611614545"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492"],"abstract_inverted_index":{"Vision-language":[0],"pre-training":[1],"(VLP)":[2],"models":[3,142],"exhibit":[4],"exceptional":[5],"generalization":[6],"capabilities":[7],"across":[8,73],"diverse":[9],"vision-language":[10],"(V+L)":[11],"tasks.":[12],"However,":[13],"studies":[14],"reveal":[15],"their":[16],"vulnerability":[17],"to":[18,41,84],"carefully":[19],"crafted":[20],"multimodal":[21,49,144],"adversarial":[22,71,87,118,145],"examples.":[23],"Notably,":[24],"state-of-the-art":[25],"attacks":[26,50],"like":[27],"Co-Attack":[28,123],"(white-box)":[29],"and":[30,124],"SGA":[31],"(transfer-based)":[32],"demonstrate":[33,113],"alarming":[34],"success":[35],"rates,":[36],"posing":[37],"critical":[38],"security":[39],"threats":[40,119],"VLP":[42,141],"models.":[43],"Current":[44],"defense":[45,66,109,131],"mechanisms":[46],"against":[47,143],"such":[48],"remain":[51],"insufficiently":[52],"explored.":[53],"To":[54],"address":[55],"this":[56],"challenge,":[57],"we":[58],"propose":[59],"Joint":[60],"Adversarial":[61],"Purification":[62],"(JAP),":[63],"a":[64,107,136],"novel":[65],"framework":[67],"that":[68,114],"synergistically":[69],"eliminates":[70],"perturbations":[72],"modalities":[74],"through":[75,94],"cross-modal":[76,81],"interaction.":[77],"Our":[78],"approach":[79],"harnesses":[80],"semantic":[82],"synergy":[83],"jointly":[85],"purify":[86],"perturbations:":[88],"Generative":[89],"denoising":[90],"establishes":[91,135],"visual-semantic":[92],"anchors":[93],"diffusion":[95],"processes,":[96],"while":[97],"purified":[98],"linguistic":[99],"cues":[100],"conversely":[101],"enhance":[102],"visual":[103],"perturbation":[104],"filtering,":[105],"forming":[106],"self-reinforcing":[108],"cycle.":[110],"Extensive":[111],"experiments":[112],"JAP":[115],"effectively":[116],"mitigates":[117],"from":[120],"both":[121],"white-box":[122],"transfer-based":[125],"SGA,":[126],"significantly":[127],"outperforming":[128],"existing":[129],"unimodal":[130],"baselines.":[132],"This":[133],"work":[134],"new":[137],"paradigm":[138],"for":[139],"securing":[140],"attacks.":[146]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
