{"id":"https://openalex.org/W4417333209","doi":"https://doi.org/10.3390/fi17120573","title":"Cross-Gen: An Efficient Generator Network for Adversarial Attacks on Cross-Modal Hashing Retrieval","display_name":"Cross-Gen: An Efficient Generator Network for Adversarial Attacks on Cross-Modal Hashing Retrieval","publication_year":2025,"publication_date":"2025-12-13","ids":{"openalex":"https://openalex.org/W4417333209","doi":"https://doi.org/10.3390/fi17120573"},"language":"en","primary_location":{"id":"doi:10.3390/fi17120573","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17120573","pdf_url":"https://www.mdpi.com/1999-5903/17/12/573/pdf?version=1765618530","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/17/12/573/pdf?version=1765618530","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007523615","display_name":"Chao Hu","orcid":"https://orcid.org/0000-0003-3606-2900"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Hu","raw_affiliation_strings":["School of Electronic Information, Central South University, Changsha 410083, China"],"raw_orcid":"https://orcid.org/0000-0003-3606-2900","affiliations":[{"raw_affiliation_string":"School of Electronic Information, Central South University, Changsha 410083, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100379250","display_name":"Li Chen","orcid":"https://orcid.org/0000-0002-4761-5913"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Chen","raw_affiliation_strings":["School of Electronic Information, Central South University, Changsha 410083, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electronic Information, Central South University, Changsha 410083, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072416382","display_name":"Sisheng Li","orcid":"https://orcid.org/0009-0006-9238-6036"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sisheng Li","raw_affiliation_strings":["School of Electronic Information, Central South University, Changsha 410083, China"],"raw_orcid":"https://orcid.org/0009-0006-9238-6036","affiliations":[{"raw_affiliation_string":"School of Electronic Information, Central South University, Changsha 410083, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101163261","display_name":"Yi Yin","orcid":null},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yin Yi","raw_affiliation_strings":["School of Electronic Information, Central South University, Changsha 410083, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electronic Information, Central South University, Changsha 410083, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102966375","display_name":"Zhan Yu","orcid":"https://orcid.org/0000-0003-2792-8178"},"institutions":[{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]},{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Zhan","raw_affiliation_strings":["China Telecom, Changsha 410083, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"China Telecom, Changsha 410083, China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074210589","display_name":"Chengguang Liu","orcid":"https://orcid.org/0000-0003-2501-3281"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengguang Liu","raw_affiliation_strings":["Big Data Institute, Central South University, Changsha 410083, China"],"raw_orcid":"https://orcid.org/0000-0003-2501-3281","affiliations":[{"raw_affiliation_string":"Big Data Institute, Central South University, Changsha 410083, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102843485","display_name":"Jianling Liu","orcid":"https://orcid.org/0000-0001-9709-3407"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianling Liu","raw_affiliation_strings":["State Key Laboratory of Powder Metallurgy, Central South University, Changsha 410083, China"],"raw_orcid":"https://orcid.org/0000-0001-9709-3407","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Powder Metallurgy, Central South University, Changsha 410083, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103971587","display_name":"Ronghua Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ronghua Shi","raw_affiliation_strings":["School of Electronic Information, Central South University, Changsha 410083, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electronic Information, Central South University, Changsha 410083, China","institution_ids":["https://openalex.org/I139660479"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5102843485"],"corresponding_institution_ids":["https://openalex.org/I139660479"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20196072,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"17","issue":"12","first_page":"573","last_page":"573"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.274399995803833,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.274399995803833,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.17010000348091125,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.13379999995231628,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.883899986743927},{"id":"https://openalex.org/keywords/generator","display_name":"Generator (circuit theory)","score":0.63919997215271},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5356000065803528},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.5198000073432922},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4596000015735626},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.4262999892234802},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.3691999912261963},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3393000066280365}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9071000218391418},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.883899986743927},{"id":"https://openalex.org/C2780992000","wikidata":"https://www.wikidata.org/wiki/Q17016113","display_name":"Generator (circuit theory)","level":3,"score":0.63919997215271},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5356000065803528},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.5198000073432922},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47839999198913574},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4596000015735626},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4374000132083893},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.4262999892234802},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3788999915122986},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3691999912261963},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3393000066280365},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3292999863624573},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32690000534057617},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.3215999901294708},{"id":"https://openalex.org/C159694833","wikidata":"https://www.wikidata.org/wiki/Q2321565","display_name":"Iterative method","level":2,"score":0.3077999949455261},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.3061000108718872},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.30390000343322754},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.29910001158714294},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.2946000099182129},{"id":"https://openalex.org/C2779803651","wikidata":"https://www.wikidata.org/wiki/Q5282088","display_name":"Discriminator","level":3,"score":0.2799000144004822},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2687000036239624},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.26159998774528503},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.25130000710487366},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.25099998712539673}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/fi17120573","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17120573","pdf_url":"https://www.mdpi.com/1999-5903/17/12/573/pdf?version=1765618530","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:66a3754f9d254ca7a24dc809633648c4","is_oa":true,"landing_page_url":"https://doaj.org/article/66a3754f9d254ca7a24dc809633648c4","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 17, Iss 12, p 573 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/fi17120573","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17120573","pdf_url":"https://www.mdpi.com/1999-5903/17/12/573/pdf?version=1765618530","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321514","display_name":"Central South University","ror":"https://ror.org/00f1zfq44"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4417333209.pdf","grobid_xml":"https://content.openalex.org/works/W4417333209.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Research":[0],"on":[1],"deep":[2],"neural":[3],"network":[4],"(DNN)-based":[5],"multi-dimensional":[6],"data":[7,106],"visualization":[8],"has":[9],"thoroughly":[10],"explored":[11],"cross-modal":[12,48,100],"hash":[13],"retrieval":[14],"(CMHR)":[15],"systems,":[16],"yet":[17],"their":[18],"vulnerability":[19],"to":[20],"malicious":[21],"adversarial":[22,39,49,85,91,125,139],"examples":[23,50,86,140],"remains":[24],"evident.":[25],"Recent":[26],"work":[27],"improves":[28],"the":[29,45,110],"robustness":[30],"of":[31,47,84],"CMHR":[32],"networks":[33],"by":[34,107],"augmenting":[35],"training":[36],"datasets":[37],"with":[38,109],"examples.":[40],"Prior":[41],"approaches":[42],"typically":[43],"formulate":[44],"generation":[46,67],"as":[51],"an":[52],"optimization":[53],"problem":[54],"solved":[55],"through":[56,113],"iterative":[57,144],"methods.":[58],"Although":[59],"effective,":[60],"such":[61],"techniques":[62],"often":[63],"suffer":[64],"from":[65],"slow":[66],"speed,":[68],"limiting":[69],"research":[70],"efficiency.":[71],"To":[72],"address":[73],"this,":[74],"we":[75,95],"propose":[76],"a":[77,88,98,121],"generative-based":[78],"method":[79],"that":[80,102,136],"enables":[81],"rapid":[82],"synthesis":[83],"via":[87],"carefully":[89],"designed":[90],"generator":[92,117],"network.":[93],"Specifically,":[94],"introduce":[96],"Cross-Gen,":[97],"parallel":[99],"framework":[101],"constructs":[103],"semantic":[104],"triplet":[105],"interacting":[108],"target":[111],"model":[112],"query-based":[114],"feedback.":[115],"The":[116,132],"is":[118],"optimized":[119],"using":[120],"tailored":[122],"objective":[123],"comprising":[124],"loss,":[126,128],"reconstruction":[127],"and":[129],"quantization":[130],"loss.":[131],"experimental":[133],"results":[134],"show":[135],"Cross-Gen":[137],"generates":[138],"significantly":[141],"faster":[142],"than":[143],"methods":[145],"while":[146],"achieving":[147],"competitive":[148],"attack":[149],"performance.":[150]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-12-15T00:00:00"}
