{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:27:28Z","timestamp":1742923648438,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819620609"},{"type":"electronic","value":"9789819620616"}],"license":[{"start":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T00:00:00Z","timestamp":1735603200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T00:00:00Z","timestamp":1735603200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-2061-6_22","type":"book-chapter","created":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T05:46:36Z","timestamp":1735537596000},"page":"296-309","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Making Strides Security in\u00a0Multimodal Fake News Detection Models: A Comprehensive Analysis of\u00a0Adversarial Attacks"],"prefix":"10.1007","author":[{"given":"Jiahua","family":"Si","sequence":"first","affiliation":[]},{"given":"Youze","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wenbo","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Richang","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,31]]},"reference":[{"key":"22_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100531","volume":"47","author":"G Ruffo","year":"2023","unstructured":"Ruffo, G., Semeraro, A., Giachanou, A., Rosso, P.: Studying fake news spreading, polarisation dynamics, and manipulation by bots: a tale of networks and language. Computer science review 47, 100531 (2023)","journal-title":"Computer science review"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Popat, K., Mukherjee, S., Str\u00f6tgen, J., Weikum, G.: Credibility assessment of textual claims on the web. In: Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, pp. 2173\u20132178 (2016)","DOI":"10.1145\/2983323.2983661"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Pasquini, C., Brunetta, C., Vinci, A.F., Conotter, V., Boato, G.: Towards the verification of image integrity in online news. In: 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/ICMEW.2015.7169801"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Singhal, S., Shah, R.R., Chakraborty, T., Kumaraguru, P., Satoh, S.: Spotfake: a multi-modal framework for fake news detection. In: 2019 IEEE Fifth International Conference on Multimedia Big Data (BigMM), pp. 39-47. IEEE (2019)","DOI":"10.1109\/BigMM.2019.00-44"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Singhal, S., Kabra, A., Sharma, M., Shah, R.R., Chakraborty, T., Kumaraguru, P.: Spotfake+: a multimodal framework for fake news detection via transfer learning (student abstract). In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, no. 10, pp. 13915\u201313916 (2020)","DOI":"10.1609\/aaai.v34i10.7230"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Chen, Y., et al.: Cross-modal ambiguity learning for multimodal fake news detection. In: Proceedings of the ACM Web Conference 2022, pp. 2897\u20132905 (2022)","DOI":"10.1145\/3485447.3511968"},{"key":"22_CR7","volume-title":"Positive unlabeled fake news detection via multi-modal masked transformer network","author":"J Wang","year":"2023","unstructured":"Wang, J., Qian, S., Hu, J., Hong, R.: Positive unlabeled fake news detection via multi-modal masked transformer network. IEEE Trans, Multimed (2023)"},{"key":"22_CR8","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)"},{"key":"22_CR9","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"22_CR10","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)"},{"key":"22_CR11","unstructured":"Lin, J., Song, C., He, K., Wang, L., Hopcroft, J.E.: Nesterov accelerated gradient and scale invariance for adversarial attacks. arXiv preprint arXiv:1908.06281 (2019)"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Dong, Y., Pang, T., Su, H., Zhu, J.: Evading defenses to transferable adversarial examples by translation-invariant attacks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4312\u20134321 (2019)","DOI":"10.1109\/CVPR.2019.00444"},{"key":"22_CR13","unstructured":"Belinkov, Y., Bisk, Y.: Synthetic and natural noise both break neural machine translation. arXiv preprint arXiv:1711.02173 (2017)"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Ren, S., Deng, Y., He, K., Che, W.: Generating natural language adversarial examples through probability weighted word saliency. In: Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, pp. 1085\u20131097 (2019)","DOI":"10.18653\/v1\/P19-1103"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Li, L., Ma, R., Guo, Q., Xue, X., Qiu, X.: Bert-attack: adversarial attack against bert using bert. arXiv preprint arXiv:2004.09984 (2020)","DOI":"10.18653\/v1\/2020.emnlp-main.500"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: Semantically equivalent adversarial rules for debugging NLP models. In: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (volume 1: long papers), pp. 856\u2013865 (2018)","DOI":"10.18653\/v1\/P18-1079"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Xu, X., Chen, X., Liu, C., Rohrbach, A., Darrell, T., Song, D.: Fooling vision and language models despite localization and attention mechanism. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4951\u20134961 (2018)","DOI":"10.1109\/CVPR.2018.00520"},{"key":"22_CR18","unstructured":"Li, C., Gao, S., Deng, C., Xie, D., Liu, W.: Cross-modal learning with adversarial samples. Advances in neural information processing systems 32 (2019)"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Li, C., Gao, S., Deng, C., Liu, W., Huang, H.: Adversarial attack on deep cross-modal hamming retrieval. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 2218\u20132227 (2021)","DOI":"10.1109\/ICCV48922.2021.00222"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, J., Yi, Q., Sang, J.: Towards adversarial attack on vision-language pre-training models. In: Proceedings of the 30th ACM International Conference on Multimedia, pp. 5005\u20135013 (2022)","DOI":"10.1145\/3503161.3547801"},{"key":"22_CR21","unstructured":"Wang, Y., Hu, W., Dong, Y., Hong, R.: Exploring transferability of multimodal adversarial samples for vision-language pre-training models with contrastive learning. arXiv preprint arXiv:2308.12636 (2023)"},{"key":"22_CR22","volume-title":"Iterative Adversarial Attack on Image-guided Story Ending Generation","author":"Y Wang","year":"2023","unstructured":"Wang, Y., Hu, W., Hong, R.: Iterative Adversarial Attack on Image-guided Story Ending Generation. IEEE Trans, Multimed (2023)"},{"key":"22_CR23","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S.: Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236 (2016)"},{"key":"22_CR24","unstructured":"Tram\u00e8r, F., Kurakin, A., Papernot, N., Goodfellow, I., Boneh, D., McDaniel, P.: Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204 (2017)"},{"key":"22_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3381180","volume-title":"Improving fast adversarial training with prior-guided knowledge","author":"X Jia","year":"2024","unstructured":"Jia, X., Zhang, Y., Wei, X., Wu, B., Ma, K., Wang, J., Cao, X.: Improving fast adversarial training with prior-guided knowledge. IEEE Trans. Pattern Anal. Mach, Intell (2024)"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Jin, Z., Cao, J., Guo, H., Zhang, Y., Luo, J.: Multimodal fusion with recurrent neural networks for rumor detection on microblogs. In: Proceedings of the 25th ACM International Conference on Multimedia, pp. 795\u2013816 (2017)","DOI":"10.1145\/3123266.3123454"},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Khattar, D., Singh Goud, J., Gupta, M., Varma, V.: Mvae: multimodal variational autoencoder for fake news detection. In: The World Wide Web Conference, pp. 2915\u20132921 (2019)","DOI":"10.1145\/3308558.3313552"},{"key":"22_CR28","unstructured":"Yin, Z., et al.: Vlattack: multimodal adversarial attacks on vision-language tasks via pre-trained models. Advances in Neural Information Processing Systems 36 (2024)"}],"container-title":["Lecture Notes in Computer Science","MultiMedia Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-2061-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T06:06:16Z","timestamp":1735538776000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-2061-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,31]]},"ISBN":["9789819620609","9789819620616"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-2061-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,31]]},"assertion":[{"value":"31 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MMM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Multimedia Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nara","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 January 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 January 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mmm2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mmm2025.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}