{"id":"https://openalex.org/W4416955789","doi":"https://doi.org/10.1145/3769102.3774434","title":"Siamese: Stealing Fine-Tuned Visual Foundation Models via Diversified Prompting","display_name":"Siamese: Stealing Fine-Tuned Visual Foundation Models via Diversified Prompting","publication_year":2025,"publication_date":"2025-12-03","ids":{"openalex":"https://openalex.org/W4416955789","doi":"https://doi.org/10.1145/3769102.3774434"},"language":null,"primary_location":{"id":"doi:10.1145/3769102.3774434","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3769102.3774434","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3769102.3774434","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Tenth ACM/IEEE Symposium on Edge Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3769102.3774434","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043587729","display_name":"Madhureeta Das","orcid":"https://orcid.org/0000-0002-1893-8182"},"institutions":[{"id":"https://openalex.org/I11957088","display_name":"Michigan Technological University","ror":"https://ror.org/0036rpn28","country_code":"US","type":"education","lineage":["https://openalex.org/I11957088"]},{"id":"https://openalex.org/I4210122926","display_name":"Decom North Sea","ror":"https://ror.org/02fjd2454","country_code":"GB","type":"nonprofit","lineage":["https://openalex.org/I4210122926"]}],"countries":["GB","US"],"is_corresponding":true,"raw_author_name":"Madhureeta Das","raw_affiliation_strings":["Michigan Technological University, Houghton, USA","Seacom Engineering College, Kolkata, India"],"raw_orcid":"https://orcid.org/0000-0002-1893-8182","affiliations":[{"raw_affiliation_string":"Michigan Technological University, Houghton, USA","institution_ids":["https://openalex.org/I11957088"]},{"raw_affiliation_string":"Seacom Engineering College, Kolkata, India","institution_ids":["https://openalex.org/I4210122926"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073718577","display_name":"Gaurav Bagwe","orcid":"https://orcid.org/0000-0001-5706-5065"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gaurav Bagwe","raw_affiliation_strings":["Clemson University, Clemson, USA"],"raw_orcid":"https://orcid.org/0000-0001-5706-5065","affiliations":[{"raw_affiliation_string":"Clemson University, Clemson, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047722991","display_name":"Miao Pan","orcid":"https://orcid.org/0000-0003-2138-4413"},"institutions":[{"id":"https://openalex.org/I4210091958","display_name":"Hanoi Open University","ror":"https://ror.org/00gjkwr85","country_code":"VN","type":"education","lineage":["https://openalex.org/I4210091958"]},{"id":"https://openalex.org/I44461941","display_name":"University of Houston","ror":"https://ror.org/048sx0r50","country_code":"US","type":"education","lineage":["https://openalex.org/I44461941"]}],"countries":["US","VN"],"is_corresponding":false,"raw_author_name":"Miao Pan","raw_affiliation_strings":["University of Houston, Houstan, USA"],"raw_orcid":"https://orcid.org/0000-0003-2138-4413","affiliations":[{"raw_affiliation_string":"University of Houston, Houstan, USA","institution_ids":["https://openalex.org/I4210091958","https://openalex.org/I44461941"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011038036","display_name":"Kaichen Yang","orcid":"https://orcid.org/0000-0003-1027-6708"},"institutions":[{"id":"https://openalex.org/I11957088","display_name":"Michigan Technological University","ror":"https://ror.org/0036rpn28","country_code":"US","type":"education","lineage":["https://openalex.org/I11957088"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kaichen Yang","raw_affiliation_strings":["Michigan Technological University, Houghton, USA"],"raw_orcid":"https://orcid.org/0000-0003-1027-6708","affiliations":[{"raw_affiliation_string":"Michigan Technological University, Houghton, USA","institution_ids":["https://openalex.org/I11957088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010643450","display_name":"Xiaoyong Yuan","orcid":"https://orcid.org/0000-0003-0782-4187"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaoyong (Brian) Yuan","raw_affiliation_strings":["Clemson University, Clemson, USA"],"raw_orcid":"https://orcid.org/0000-0003-0782-4187","affiliations":[{"raw_affiliation_string":"Clemson University, Clemson, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100322310","display_name":"Lan Zhang","orcid":"https://orcid.org/0000-0002-7718-6128"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lan Zhang","raw_affiliation_strings":["Clemson University, Clemson, USA"],"raw_orcid":"https://orcid.org/0000-0002-7718-6128","affiliations":[{"raw_affiliation_string":"Clemson University, Clemson, USA","institution_ids":["https://openalex.org/I8078737"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5043587729"],"corresponding_institution_ids":["https://openalex.org/I11957088","https://openalex.org/I4210122926"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19513994,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9757000207901001,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9757000207901001,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.0034000000450760126,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11307","display_name":"Domain Adaptation and Few-Shot Learning","score":0.003000000026077032,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/foundation","display_name":"Foundation (evidence)","score":0.6491000056266785},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.5543000102043152},{"id":"https://openalex.org/keywords/orthogonality","display_name":"Orthogonality","score":0.5175999999046326},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.47130000591278076},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.47029998898506165},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.4050999879837036}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6779999732971191},{"id":"https://openalex.org/C2780966255","wikidata":"https://www.wikidata.org/wiki/Q5474306","display_name":"Foundation (evidence)","level":2,"score":0.6491000056266785},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.5543000102043152},{"id":"https://openalex.org/C17137986","wikidata":"https://www.wikidata.org/wiki/Q215067","display_name":"Orthogonality","level":2,"score":0.5175999999046326},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48350000381469727},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.47130000591278076},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.47029998898506165},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4526999890804291},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.4050999879837036},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.39469999074935913},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3140999972820282},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.2969000041484833},{"id":"https://openalex.org/C162932704","wikidata":"https://www.wikidata.org/wiki/Q1058791","display_name":"Synchronizing","level":3,"score":0.2915000021457672},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.2750999927520752},{"id":"https://openalex.org/C172367668","wikidata":"https://www.wikidata.org/wiki/Q6504956","display_name":"Data visualization","level":3,"score":0.2621999979019165},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.2572000026702881},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2517000138759613}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3769102.3774434","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3769102.3774434","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3769102.3774434","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Tenth ACM/IEEE Symposium on Edge Computing","raw_type":"proceedings-article"},{"id":"pmh:oai:digitalcommons.mtu.edu:michigantech-p2-3267","is_oa":true,"landing_page_url":"https://digitalcommons.mtu.edu/michigantech-p2/2207","pdf_url":null,"source":{"id":"https://openalex.org/S4377196391","display_name":"Digital Commons - Michigan Tech (Michigan Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11957088","host_organization_name":"Michigan Technological University","host_organization_lineage":["https://openalex.org/I11957088"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Michigan Tech Publications","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3769102.3774434","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3769102.3774434","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3769102.3774434","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Tenth ACM/IEEE Symposium on Edge Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G106460892","display_name":null,"funder_award_id":"2419880","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G1743096580","display_name":"ERI: Towards Robust and Secure Intelligent 3D Sensing Systems","funder_award_id":"2347426","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416955789.pdf","grobid_xml":"https://content.openalex.org/works/W4416955789.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W2155904486","https://openalex.org/W3087685156","https://openalex.org/W3138516171","https://openalex.org/W3145450063","https://openalex.org/W3174136778","https://openalex.org/W4312343407","https://openalex.org/W4312651322","https://openalex.org/W4323059284","https://openalex.org/W4382317858","https://openalex.org/W4391319559"],"related_works":[],"abstract_inverted_index":{"Visual":[0],"foundation":[1,71,111,131,210],"models,":[2,72],"characterized":[3],"by":[4,181],"their":[5],"robust":[6],"generalization":[7],"and":[8,30,56,76,79,116,136,156,187],"adaptability,":[9],"serve":[10],"as":[11,54],"the":[12,146,162,169,185,204],"basis":[13],"for":[14,23,38,88],"a":[15,126,130,154,175],"wide":[16],"array":[17],"of":[18,122,207],"downstream":[19,83],"tasks.":[20],"When":[21],"fine-tuned":[22,81,109,138,208],"specific":[24],"tasks,":[25,84],"these":[26,59,150],"models":[27,65,112,211],"encapsulate":[28],"confidential":[29],"valuable":[31],"task-specific":[32,94],"knowledge,":[33],"making":[34],"them":[35],"prime":[36],"targets":[37],"model":[39,128,132],"stealing":[40],"(MS)":[41],"attacks.":[42],"While":[43],"recent":[44],"efforts":[45],"have":[46],"exposed":[47],"MS":[48,90,103,213],"threats":[49],"in":[50,201],"practical":[51],"scenarios":[52],"such":[53],"data-free":[55],"hard-label":[57,117],"contexts,":[58],"attacks":[60,91,198],"predominantly":[61],"target":[62],"traditional":[63,89],"victim":[64,186],"trained":[66],"from":[67,149],"scratch.":[68],"Fine-tuned":[69],"visual":[70,110,209],"pre-trained":[73],"on":[74,82],"vast":[75],"diverse":[77],"datasets":[78],"then":[80],"present":[85],"significant":[86],"challenges":[87],"to":[92,107,171,212],"extract":[93],"knowledge.":[95],"In":[96],"this":[97],"paper,":[98],"we":[99,152],"introduce":[100],"an":[101],"innovative":[102],"attack,":[104],"named":[105],"SIAMESE,":[106],"steal":[108],"under":[113],"black-box,":[114],"data-free,":[115],"settings.":[118],"The":[119],"core":[120],"approach":[121],"SIAMESE":[123,180,194],"involves":[124],"constructing":[125],"stolen":[127,188],"using":[129],"that":[133,160,193],"is":[134],"efficiently":[135],"concurrently":[137],"with":[139],"multiple":[140],"diversified":[141],"soft":[142],"prompts.":[143],"To":[144],"integrate":[145],"knowledge":[147],"derived":[148],"prompts,":[151],"propose":[153],"novel":[155],"tractable":[157],"loss":[158],"function":[159],"analyzes":[161],"output":[163],"distributions":[164],"while":[165],"enforcing":[166],"orthogonality":[167],"among":[168],"prompts":[170],"minimize":[172],"interference.":[173],"Additionally,":[174],"unique":[176],"alignment":[177],"module":[178],"enhances":[179],"synchronizing":[182],"interpretations":[183],"between":[184],"models.":[189],"Extensive":[190],"experiments":[191],"validate":[192],"outperforms":[195],"state-of-the-art":[196],"baseline":[197],"over":[199],"10%":[200],"accuracy,":[202],"exposing":[203],"heightened":[205],"vulnerability":[206],"threats.":[214]},"counts_by_year":[],"updated_date":"2026-03-07T13:37:22.277990","created_date":"2025-12-03T00:00:00"}
