{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T13:06:56Z","timestamp":1774530416063,"version":"3.50.1"},"reference-count":60,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62402087"],"award-info":[{"award-number":["62402087"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012542","name":"Sichuan Province Science and Technology Support Program","doi-asserted-by":"publisher","award":["2025ZNSFSC1490"],"award-info":[{"award-number":["2025ZNSFSC1490"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013804","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100013804","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2024M760356"],"award-info":[{"award-number":["2024M760356"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["BX20230060"],"award-info":[{"award-number":["BX20230060"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["ZYGX2024J019"],"award-info":[{"award-number":["ZYGX2024J019"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.neucom.2026.133346","type":"journal-article","created":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T16:33:26Z","timestamp":1773419606000},"page":"133346","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["TrojanEdit: Multimodal backdoor attack against image editing model"],"prefix":"10.1016","volume":"681","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-8990-436X","authenticated-orcid":false,"given":"Ji","family":"Guo","sequence":"first","affiliation":[]},{"given":"Runjia","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4592-8094","authenticated-orcid":false,"given":"Wenbo","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Yiting","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jiachen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jiaming","family":"He","sequence":"additional","affiliation":[]},{"given":"Hongwei","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.neucom.2026.133346_bib0005","first-page":"18187","article-title":"Blended diffusion for text-driven editing of natural images","volume":"2022","author":"Avrahami","year":"2022","journal-title":"Comput. Res. Repos."},{"key":"10.1016\/j.neucom.2026.133346_bib0010","series-title":"Proceedings of ECCV","first-page":"707","article-title":"Text2live: text-driven layered image and video editing","author":"Bar-Tal","year":"2022"},{"key":"10.1016\/j.neucom.2026.133346_bib0015","first-page":"18392","article-title":"Instructpix2pix: learning to follow image editing instructions","author":"Brooks","year":"2023","journal-title":"Proc. CVPR"},{"key":"10.1016\/j.neucom.2026.133346_bib0020","series-title":"Proceedings of CVPR","first-page":"4035","article-title":"Trojdiff: trojan attacks on diffusion models with diverse targets","author":"Chen","year":"2023"},{"key":"10.1016\/j.neucom.2026.133346_bib0025","author":"Chen"},{"key":"10.1016\/j.neucom.2026.133346_bib0030","doi-asserted-by":"crossref","first-page":"13628","DOI":"10.1109\/TNNLS.2025.3540303","article-title":"Backdoor attacks and countermeasures in natural language processing models: a comprehensive security review","volume":"36","author":"Cheng","year":"2023","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.neucom.2026.133346_bib0035","first-page":"4015","article-title":"How to backdoor diffusion models?","author":"Chou","year":"2023","journal-title":"Proc. CVPR"},{"key":"10.1016\/j.neucom.2026.133346_bib0040","author":"Chou"},{"key":"10.1016\/j.neucom.2026.133346_bib0045","series-title":"Proceedings of NeurIPS","article-title":"Diffusion models beat Gans on image synthesis","author":"Dhariwal","year":"2021"},{"key":"10.1016\/j.neucom.2026.133346_bib0050","series-title":"Proceedings of NeurIPS","article-title":"Diffusion models beat Gans on image synthesis","author":"Dhariwal","year":"2021"},{"key":"10.1016\/j.neucom.2026.133346_bib0055","first-page":"16222","article-title":"Diffusion self-guidance for controllable image generation","volume":"36","author":"Epstein","year":"2023","journal-title":"Proc. NeurIPS"},{"key":"10.1016\/j.neucom.2026.133346_bib0060","doi-asserted-by":"crossref","first-page":"2329","DOI":"10.1109\/TMM.2021.3079723","article-title":"Push & pull: transferable adversarial examples with attentive attack","volume":"24","author":"Gao","year":"2021","journal-title":"IEEE Trans. Multimedia"},{"key":"10.1016\/j.neucom.2026.133346_bib0065","author":"Gu"},{"key":"10.1016\/j.neucom.2026.133346_bib0070","series-title":"Proceedings of S&P","first-page":"3385","article-title":"Backdooring multimodal learning","author":"Han","year":"2024"},{"key":"10.1016\/j.neucom.2026.133346_bib0075","series-title":"International Conference on Multimedia Computing and Systems","first-page":"1","article-title":"Diff-cleanse: identifying and mitigating backdoor attacks in diffusion models","author":"Hao","year":"2025"},{"key":"10.1016\/j.neucom.2026.133346_bib0080","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"26220","article-title":"Watch out for your guidance on generation! exploring conditional backdoor attacks against large language models","author":"He","year":"2025"},{"key":"10.1016\/j.neucom.2026.133346_bib0085","first-page":"1","article-title":"Monotonic rank knowledge distillation via Kendall correlation","author":"He","year":"2026","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.neucom.2026.133346_bib0090","author":"Hertz"},{"key":"10.1016\/j.neucom.2026.133346_bib0095","author":"Ho"},{"key":"10.1016\/j.neucom.2026.133346_bib0100","author":"Ho"},{"key":"10.1016\/j.neucom.2026.133346_bib0105","series-title":"ICLR Workshop on Deep Generative Models for Highly Structured Data","article-title":"Video diffusion models","author":"Ho","year":"2022"},{"key":"10.1016\/j.neucom.2026.133346_bib0110","series-title":"Proceedings of the 2025 Conference on Empirical Methods in Natural Language Processing","first-page":"25671","article-title":"Evaluating robustness of large audio language models to audio injection: an empirical study","author":"Hou","year":"2025"},{"key":"10.1016\/j.neucom.2026.133346_bib0115","doi-asserted-by":"crossref","first-page":"21169","DOI":"10.1609\/aaai.v38i19.30110","article-title":"Personalization as a shortcut for few-shot backdoor attack against text-to-image diffusion models","volume":"38","author":"Huang","year":"2024","journal-title":"Proc. AAAI"},{"key":"10.1016\/j.neucom.2026.133346_bib0120","first-page":"8133","article-title":"Color backdoor: a robust poisoning attack in color space","author":"Jiang","year":"2023","journal-title":"Proc. CVPR"},{"key":"10.1016\/j.neucom.2026.133346_bib0125","first-page":"6007","article-title":"Imagic: text-based real image editing with diffusion models","author":"Kawar","year":"2022","journal-title":"Proc. CVPR"},{"key":"10.1016\/j.neucom.2026.133346_bib0130","author":"Li"},{"issue":"1","key":"10.1016\/j.neucom.2026.133346_bib0135","article-title":"Vl-trojan: multimodal instruction backdoor attacks against autoregressive visual language models","volume":"49","author":"Liang","year":"2025","journal-title":"Int. J. Comput. Vis."},{"key":"10.1016\/j.neucom.2026.133346_bib0140","series-title":"2025 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"9477","article-title":"Revisiting backdoor attacks against large vision-language models from domain shift","author":"Liang","year":"2025"},{"key":"10.1016\/j.neucom.2026.133346_bib0145","series-title":"International Symposium on Research in Attacks, Intrusions, and Defenses","first-page":"273","article-title":"Fine-pruning: defending against backdooring attacks on deep neural networks","author":"Liu","year":"2018"},{"key":"10.1016\/j.neucom.2026.133346_bib0150","author":"Liu"},{"key":"10.1016\/j.neucom.2026.133346_bib0155","series-title":"Proceedings of ECCV","article-title":"Reflection backdoor: a natural backdoor attack on deep neural networks","author":"Liu","year":"2020"},{"key":"10.1016\/j.neucom.2026.133346_bib0160","first-page":"25060","article-title":"Stealthy backdoor attack in self-supervised learning vision encoders for large vision language models","author":"Liu","year":"2025","journal-title":"IEEE\/CVF Conf. Comput. Vis. Pattern Recognit."},{"key":"10.1016\/j.neucom.2026.133346_bib0165","series-title":"Proceedings of CVPR","first-page":"11461","article-title":"Repaint: inpainting using denoising diffusion probabilistic models","author":"Lugmayr","year":"2022"},{"key":"10.1016\/j.neucom.2026.133346_bib0170","series-title":"2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"2836","article-title":"Diffusion probabilistic models for 3D point cloud generation","author":"Luo","year":"2021"},{"key":"10.1016\/j.neucom.2026.133346_bib0175","series-title":"The Thirteenth International Conference on Learning Representations","article-title":"Backdooring vision-language models with out-of-distribution data","author":"Lyu","year":"2025"},{"key":"10.1016\/j.neucom.2026.133346_bib0180","author":"Meng"},{"key":"10.1016\/j.neucom.2026.133346_bib0185","series-title":"Proceedings of ICLR","article-title":"Wanet - imperceptible warping-based backdoor attack","author":"Nguyen","year":"2021"},{"key":"10.1016\/j.neucom.2026.133346_bib0190","first-page":"16784","article-title":"Glide: towards photorealistic image generation and editing with text-guided diffusion models","author":"Nichol","year":"2022","journal-title":"Proc. ICML"},{"key":"10.1016\/j.neucom.2026.133346_bib0195","series-title":"Proceedings of CVPR","first-page":"8238","article-title":"Balanced multimodal learning via on-the-fly gradient modulation","author":"Peng","year":"2022"},{"key":"10.1016\/j.neucom.2026.133346_bib0200","author":"Ramesh"},{"key":"10.1016\/j.neucom.2026.133346_bib0205","author":"Schuhmann"},{"key":"10.1016\/j.neucom.2026.133346_bib0210","series-title":"Proceedings of CVPR","first-page":"8839","article-title":"Dragdiffusion: harnessing diffusion models for interactive point-based image editing","author":"Shi","year":"2024"},{"key":"10.1016\/j.neucom.2026.133346_bib0215","author":"Shuai"},{"key":"10.1016\/j.neucom.2026.133346_bib0220","series-title":"Proceedings of ICCV","first-page":"165","article-title":"Tijo: trigger inversion with joint optimization for defending multimodal backdoored models","author":"Sur","year":"2023"},{"key":"10.1016\/j.neucom.2026.133346_bib0225","first-page":"1921","article-title":"Plug-and-play diffusion features for text-driven image-to-image translation","author":"Tumanyan","year":"2023","journal-title":"Proc. CVPR"},{"key":"10.1016\/j.neucom.2026.133346_bib0230","doi-asserted-by":"crossref","DOI":"10.1109\/TIFS.2024.3386058","article-title":"Bagm: a backdoor attack for manipulating text-to-image generative models","volume":"19","author":"Vice","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.neucom.2026.133346_bib0235","series-title":"Proceedings of CVPR","first-page":"15375","article-title":"Dual-key multimodal backdoors for visual question answering","author":"Walmer","year":"2022"},{"key":"10.1016\/j.neucom.2026.133346_bib0240","author":"Wang"},{"key":"10.1016\/j.neucom.2026.133346_bib0245","doi-asserted-by":"crossref","first-page":"6410","DOI":"10.1109\/TMM.2025.3581811","article-title":"Exploring transferability of multimodal adversarial samples for vision-language pre-training models with contrastive learning","volume":"27","author":"Wang","year":"2025","journal-title":"IEEE Trans. Multimedia"},{"key":"10.1016\/j.neucom.2026.133346_bib0250","doi-asserted-by":"crossref","first-page":"6117","DOI":"10.1109\/TMM.2023.3345167","article-title":"Iterative adversarial attack on image-guided story ending generation","volume":"26","author":"Wang","year":"2023","journal-title":"IEEE Trans. Multimedia"},{"key":"10.1016\/j.neucom.2026.133346_bib0255","doi-asserted-by":"crossref","first-page":"3778","DOI":"10.1109\/TMM.2023.3315550","article-title":"Boosting adversarial transferability with learnable patch-wise masks","volume":"26","author":"Wei","year":"2023","journal-title":"IEEE Trans. Multimedia"},{"key":"10.1016\/j.neucom.2026.133346_bib0260","article-title":"On-the-fly modulation for balanced multimodal learning","author":"Wei","year":"2024","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.neucom.2026.133346_bib0265","series-title":"Proceedings of ECCV","first-page":"71","article-title":"Diagnosing and re-learning for balanced multimodal learning","author":"Wei","year":"2024"},{"key":"10.1016\/j.neucom.2026.133346_bib0270","doi-asserted-by":"crossref","DOI":"10.1109\/TPAMI.2022.3181070","article-title":"GAN inversion: a survey","volume":"45","author":"Xia","year":"2023","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.neucom.2026.133346_bib0275","doi-asserted-by":"crossref","first-page":"20402","DOI":"10.1007\/s10489-023-04575-8","article-title":"Compression-resistant backdoor attack against deep neural networks","volume":"53","author":"Xue","year":"2023","journal-title":"Appl. Intell."},{"key":"10.1016\/j.neucom.2026.133346_bib0280","first-page":"48723","article-title":"Imagebrush: learning visual in-context instructions for exemplar-based image manipulation","volume":"36","author":"Yang","year":"2023","journal-title":"Proc. NeurIPS"},{"key":"10.1016\/j.neucom.2026.133346_bib0285","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1109\/TMM.2023.3267882","article-title":"Noise imitation based adversarial training for robust multimodal sentiment analysis","volume":"26","author":"Yuan","year":"2023","journal-title":"IEEE Trans. Multimedia"},{"key":"10.1016\/j.neucom.2026.133346_bib0290","series-title":"Proceedings of ACM MM","article-title":"Text-to-image diffusion models can be easily backdoored through multimodal data poisoning","author":"Zhai","year":"2023"},{"key":"10.1016\/j.neucom.2026.133346_bib0295","author":"Zhao"},{"key":"10.1016\/j.neucom.2026.133346_bib0300","series-title":"Proceedings of ICCV","article-title":"3d shape generation and completion through point-voxel diffusion","author":"Zhou","year":"2021"}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226007435?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226007435?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T12:30:27Z","timestamp":1774528227000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231226007435"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":60,"alternative-id":["S0925231226007435"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133346","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"TrojanEdit: Multimodal backdoor attack against image editing model","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133346","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"133346"}}