{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:24:38Z","timestamp":1757629478826,"version":"3.44.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032045454","type":"print"},{"value":"9783032045461","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-04546-1_15","type":"book-chapter","created":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T14:53:09Z","timestamp":1757515989000},"page":"172-183","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Art Style Backdoor Attacks on\u00a0Semantic Segmentation Models"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4897-5157","authenticated-orcid":false,"given":"Jinsu","family":"Yang","sequence":"first","affiliation":[]},{"given":"Fen","family":"Xiao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9231-8660","authenticated-orcid":false,"given":"Zexin","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3611-7294","authenticated-orcid":false,"given":"Ye","family":"Xiao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1014-9565","authenticated-orcid":false,"given":"Wenhan","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Weiping","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,11]]},"reference":[{"issue":"1","key":"15_CR1","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1186\/s12880-022-00793-7","volume":"22","author":"HE Kim","year":"2022","unstructured":"Kim, H.E., Cosa-Linan, A., Santhanam, N., et al.: Transfer learning for medical image classification: a literature review. BMC Med. Imaging 22(1), 69 (2022)","journal-title":"BMC Med. Imaging"},{"key":"15_CR2","first-page":"100134","volume":"6","author":"J Chai","year":"2021","unstructured":"Chai, J., Zeng, H., Li, A., et al.: Deep learning in computer vision: a critical review of emerging techniques and application scenarios. Mach. Learn. Appl. 6, 100134 (2021)","journal-title":"Mach. Learn. Appl."},{"issue":"3","key":"15_CR3","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1109\/TITS.2020.2972974","volume":"22","author":"D Feng","year":"2020","unstructured":"Feng, D., Haase-Sch\u00fctz, C., Rosenbaum, L., et al.: Deep multi-modal object detection and semantic segmentation for autonomous driving: datasets, methods, and challenges. IEEE Trans. Intell. Transp. Syst. 22(3), 1341\u20131360 (2020)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s10462-020-09854-1","volume":"54","author":"S Asgari Taghanaki","year":"2021","unstructured":"Asgari Taghanaki, S., Abhishek, K., Cohen, J.P., et al.: Deep semantic segmentation of natural and medical images: a review. Artif. Intell. Rev. 54, 137\u2013178 (2021)","journal-title":"Artif. Intell. Rev."},{"key":"15_CR5","unstructured":"Li, Y., Li, Y., Lv, Y., et al.: Hidden backdoor attack against semantic segmentation models. arXiv preprint arXiv:2103.04038 (2021)"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"103365","DOI":"10.1016\/j.cose.2023.103365","volume":"132","author":"J Mao","year":"2023","unstructured":"Mao, J., Qian, Y., Huang, J., et al.: Object-free backdoor attack and defense on semantic segmentation. Comput. Secur. 132, 103365 (2023)","journal-title":"Comput. Secur."},{"key":"15_CR7","unstructured":"Lan, H., Gu, J., Torr, P., et al.: Influencer backdoor attack on semantic segmentation. arXiv preprint arXiv:2303.12054 (2023)"},{"issue":"1","key":"15_CR8","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TNNLS.2022.3182979","volume":"35","author":"Y Li","year":"2022","unstructured":"Li, Y., Jiang, Y., Li, Z., et al.: Backdoor learning: a survey. IEEE Trans. Neural Netw. Learn. Syst. 35(1), 5\u201322 (2022)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"47230","DOI":"10.1109\/ACCESS.2019.2909068","volume":"7","author":"T Gu","year":"2019","unstructured":"Gu, T., Liu, K., Dolan-Gavitt, B., et al.: BadNets: Evaluating backdooring attacks on deep neural networks. IEEE Access 7, 47230\u201347244 (2019)","journal-title":"IEEE Access"},{"key":"15_CR10","unstructured":"Li, Y., Zhai, T., Wu, B., et al.: Rethinking the trigger of backdoor attack. arXiv preprint arXiv:2004.04692 (2020)"},{"key":"15_CR11","first-page":"3454","volume":"33","author":"TA Nguyen","year":"2020","unstructured":"Nguyen, T.A., Tran, A.: Input-aware dynamic backdoor attack. Adv. Neural. Inf. Process. Syst. 33, 3454\u20133464 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Cheng, S., Liu, Y., Ma, S., et al.: Deep feature space trojan attack of neural networks by controlled detoxification. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, no. 2, pp. 1148\u20131156 (2021)","DOI":"10.1609\/aaai.v35i2.16201"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1007\/978-3-319-46475-6_43","volume-title":"Computer Vision \u2013 ECCV 2016","author":"J Johnson","year":"2016","unstructured":"Johnson, J., Alahi, A., Fei-Fei, L.: Perceptual losses for real-time style transfer and super-resolution. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9906, pp. 694\u2013711. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46475-6_43"},{"key":"15_CR14","unstructured":"Ulyanov, D., Vedaldi, A., Lempitsky, V.: Instance normalization: the missing ingredient for fast stylization. arXiv preprint arXiv:1607.08022 (2016)"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-319-10602-1_48","volume-title":"Computer Vision \u2013 ECCV 2014","author":"T-Y Lin","year":"2014","unstructured":"Lin, T.-Y., et al.: Microsoft COCO: common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8693, pp. 740\u2013755. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10602-1_48"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Kurzman, L., Vazquez, D., Laradji, I.: Class-based styling: Real-time localized style transfer with semantic segmentation. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision Workshops (2019)","DOI":"10.1109\/ICCVW.2019.00396"},{"key":"15_CR17","unstructured":"Li, G., Yun, I., Kim, J., et al.: DabNet: depth-wise asymmetric bottleneck for real-time semantic (2019)"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Cordts, M., Omran, M., Ramos, S., et al.: The cityscapes dataset for semantic urban scene understanding. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3213\u20133223 (2016)","DOI":"10.1109\/CVPR.2016.350"},{"key":"15_CR19","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11263-009-0275-4","volume":"88","author":"M Everingham","year":"2010","unstructured":"Everingham, M., Van Gool, L., Williams, C.K.I., et al.: The pascal visual object classes (VOC) challenge. Int. J. Comput. Vision 88, 303\u2013338 (2010)","journal-title":"Int. J. Comput. Vision"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Chen, L.C., Zhu, Y., Papandreou, G., et al.: Encoder-decoder with atrous separable convolution for semantic image segmentation. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 801\u2013818 (2018)","DOI":"10.1007\/978-3-030-01234-2_49"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Yang, M., Yu, K., Zhang, C., et al.: DenseASPP for semantic segmentation in street scenes. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3684\u20133692 (2018)","DOI":"10.1109\/CVPR.2018.00388"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Fu, J., Liu, J., Tian, H., et al.: Dual attention network for scene segmentation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3146\u20133154 (2019)","DOI":"10.1109\/CVPR.2019.00326"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Zhao, H., Shi, J., Qi, X., et al.: Pyramid scene parsing network. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2881\u20132890 (2017)","DOI":"10.1109\/CVPR.2017.660"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks and Machine Learning \u2013 ICANN 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-04546-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T14:53:15Z","timestamp":1757515995000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-04546-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,11]]},"ISBN":["9783032045454","9783032045461"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-04546-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,11]]},"assertion":[{"value":"11 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kaunas","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lithuania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"34","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icann2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/e-nns.org\/icann2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}