{"id":"https://openalex.org/W4415537015","doi":"https://doi.org/10.1145/3746027.3755478","title":"Diffusion-based Adversarial Identity Manipulation for Facial Privacy Protection","display_name":"Diffusion-based Adversarial Identity Manipulation for Facial Privacy Protection","publication_year":2025,"publication_date":"2025-10-25","ids":{"openalex":"https://openalex.org/W4415537015","doi":"https://doi.org/10.1145/3746027.3755478"},"language":null,"primary_location":{"id":"doi:10.1145/3746027.3755478","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3746027.3755478","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd ACM International Conference on Multimedia","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009492458","display_name":"L.F.S. Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liqin Wang","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050815384","display_name":"Qianyue Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianyue Hu","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083054357","display_name":"Wei Lu","orcid":"https://orcid.org/0000-0002-4068-1766"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Lu","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090509213","display_name":"Xiangyang Luo","orcid":"https://orcid.org/0000-0003-3225-4649"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiangyang Luo","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5009492458"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.38303117,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"11562","last_page":"11571"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7652000188827515},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.6651999950408936},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5683000087738037},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.49639999866485596},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.43689998984336853},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.430400013923645},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4068000018596649},{"id":"https://openalex.org/keywords/regularization","display_name":"Regularization (linguistics)","score":0.3603000044822693}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7652000188827515},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7077999711036682},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.6651999950408936},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5683000087738037},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.49639999866485596},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4812999963760376},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.447299987077713},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.43689998984336853},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.430400013923645},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4068000018596649},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4059999883174896},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.385699987411499},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.36660000681877136},{"id":"https://openalex.org/C2776135515","wikidata":"https://www.wikidata.org/wiki/Q17143721","display_name":"Regularization (linguistics)","level":2,"score":0.3603000044822693},{"id":"https://openalex.org/C61272859","wikidata":"https://www.wikidata.org/wiki/Q7834031","display_name":"Transferability","level":3,"score":0.3449000120162964},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.33399999141693115},{"id":"https://openalex.org/C2776608160","wikidata":"https://www.wikidata.org/wiki/Q4785462","display_name":"Natural (archaeology)","level":2,"score":0.3068999946117401},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.29750001430511475},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2937999963760376},{"id":"https://openalex.org/C54654163","wikidata":"https://www.wikidata.org/wiki/Q5428359","display_name":"Face hallucination","level":5,"score":0.28940001130104065},{"id":"https://openalex.org/C98447023","wikidata":"https://www.wikidata.org/wiki/Q1540351","display_name":"Social identity theory","level":3,"score":0.2547999918460846},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.25429999828338623},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2542000114917755},{"id":"https://openalex.org/C2779813694","wikidata":"https://www.wikidata.org/wiki/Q528053","display_name":"Digital identity","level":3,"score":0.2524000108242035}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3746027.3755478","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3746027.3755478","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd ACM International Conference on Multimedia","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1387363624","display_name":null,"funder_award_id":"No.62441237, No.62172435","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1901129140","https://openalex.org/W2096733369","https://openalex.org/W2133665775","https://openalex.org/W2143331350","https://openalex.org/W2797558164","https://openalex.org/W2805754451","https://openalex.org/W2962858109","https://openalex.org/W2969985801","https://openalex.org/W2989149111","https://openalex.org/W3179610792","https://openalex.org/W3216352822","https://openalex.org/W4220765846","https://openalex.org/W4226014430","https://openalex.org/W4312234230","https://openalex.org/W4312740349","https://openalex.org/W4312933868","https://openalex.org/W4312937923","https://openalex.org/W4386071604","https://openalex.org/W4386076336","https://openalex.org/W4386076532","https://openalex.org/W4402727236","https://openalex.org/W4402753991","https://openalex.org/W4403422358","https://openalex.org/W4403791336"],"related_works":[],"abstract_inverted_index":{"The":[0,100],"success":[1],"of":[2,74,167],"face":[3,33,140],"recognition":[4],"(FR)":[5],"systems":[6],"has":[7],"led":[8],"to":[9,14,30,50,129],"serious":[10],"privacy":[11,28],"concerns":[12],"due":[13],"potential":[15],"unauthorized":[16],"surveillance":[17],"and":[18,53,142,177],"user":[19],"tracking":[20],"on":[21,138],"social":[22],"networks.":[23],"Existing":[24],"methods":[25],"for":[26,104,171],"enhancing":[27],"fail":[29],"generate":[31,51],"natural":[32,52],"images":[34],"that":[35,146],"can":[36],"protect":[37],"facial":[38,67,131],"privacy.":[39],"In":[40],"this":[41],"paper,":[42],"we":[43,65],"propose":[44],"diffusion-based":[45],"adversarial":[46,56,83,98],"identity":[47,68,84,105],"manipulation":[48],"(DiffAIM)":[49],"highly":[54],"transferable":[55],"faces":[57],"against":[58],"malicious":[59],"FR":[60,173],"systems.":[61],"To":[62],"be":[63],"specific,":[64],"manipulate":[66],"within":[69],"the":[70,87,93,96,115,149,165,168],"low-dimensional":[71],"latent":[72],"space":[73],"a":[75,108],"diffusion":[76,89],"model.":[77],"This":[78],"involves":[79],"iteratively":[80],"injecting":[81],"gradient-based":[82],"guidance":[85,101],"during":[86,134],"reverse":[88],"process,":[90],"progressively":[91],"steering":[92],"generation":[94],"toward":[95],"desired":[97],"faces.":[99],"is":[102],"optimized":[103],"convergence":[106],"towards":[107],"target":[109],"while":[110,120,157],"promoting":[111],"semantic":[112],"divergence":[113],"from":[114],"source,":[116],"facilitating":[117],"effective":[118],"impersonation":[119],"maintaining":[121,158],"visual":[122,160],"naturalness.":[123],"We":[124,162],"further":[125],"incorporate":[126],"structure-preserving":[127],"regularization":[128],"preserve":[130],"structure":[132],"consistency":[133],"manipulation.":[135],"Extensive":[136],"experiments":[137],"both":[139],"verification":[141],"identification":[143],"tasks":[144],"demonstrate":[145,164],"compared":[147],"with":[148],"state-of-the-art,":[150],"DiffAIM":[151],"achieves":[152],"stronger":[153],"black-box":[154],"attack":[155],"transferability":[156],"superior":[159],"quality.":[161],"also":[163],"effectiveness":[166],"proposed":[169],"approach":[170],"commercial":[172],"APIs,":[174],"including":[175],"Face++":[176],"Aliyun.":[178]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-25T00:00:00"}
