{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T06:28:16Z","timestamp":1774420096982,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,6]]},"DOI":"10.1109\/icassp49660.2025.10887876","type":"proceedings-article","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T17:15:02Z","timestamp":1741799702000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Training an Anti-KD Model that Cannot Teach Students via Similarity Disruption"],"prefix":"10.1109","author":[{"given":"Zheming","family":"Liang","sequence":"first","affiliation":[{"name":"University of Science and Technology of China,School of Cyber Science and Technology"}]},{"given":"Qi","family":"Chu","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China,School of Cyber Science and Technology"}]},{"given":"Tao","family":"Gong","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China,School of Cyber Science and Technology"}]},{"given":"Bin","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China,School of Cyber Science and Technology"}]},{"given":"Quanchen","family":"Zou","sequence":"additional","affiliation":[{"name":"360 AI Security Lab"}]},{"given":"Deyue","family":"Zhang","sequence":"additional","affiliation":[{"name":"360 AI Security Lab"}]},{"given":"Nenghai","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China,School of Cyber Science and Technology"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Distilling the knowledge in a neural network","author":"Hinton","year":"2015"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i2.25236"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01163"},{"key":"ref4","article-title":"NORM: Knowledge distillation via n-to-one representation matching","volume-title":"The Eleventh International Conference on Learning Representations","author":"Liu"},{"key":"ref5","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00031"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00072"},{"key":"ref10","article-title":"A view from somewhere: Human-centric face representations","volume-title":"The Eleventh International Conference on Learning Representations","author":"Andrews"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2958756"},{"key":"ref12","article-title":"Prediction poisoning: Towards defenses against dnn model stealing attacks","author":"Orekondy","year":"2019"},{"key":"ref13","first-page":"15 241","article-title":"How to steer your adversary: Targeted and efficient model stealing defenses with gradient redirection","volume-title":"International Conference on Machine Learning","author":"Mazeika"},{"key":"ref14","article-title":"Undistillable: Making a nasty teacher that cannot teach students","volume-title":"International Conference on Learning Representations","author":"Ma"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01360"},{"key":"ref16","article-title":"Dual student networks for data-free model stealing","volume-title":"The Eleventh International Conference on Learning Representations","author":"Beetham"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01485"},{"key":"ref18","article-title":"Ideal: Query-efficient data-free learning from black-box models","volume-title":"The Eleventh International Conference on Learning Representations","author":"Zhang"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475591"},{"key":"ref21","first-page":"52","article-title":"Sok: How robust is deep neural network image classification watermarking","volume-title":"IEEE Symposium on Security and Privacy","author":"Lukas"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241142"},{"key":"ref23","article-title":"Thieves on sesame street! model extraction of bert-based apis","author":"Krishna","year":"2019"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00085"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01252-6_17"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00145"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00409"},{"key":"ref28","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009","journal-title":"Tech Report"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00363"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119202"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i6.20613"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.133"},{"key":"ref34","article-title":"It\u2019s all in the head: Representation knowledge distillation through classifier sharing","author":"Ben-Baruch","year":"2022"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00511"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01165"},{"key":"ref37","article-title":"Contrastive representation distillation","volume-title":"International Conference on Learning Representations","author":"Tian"},{"key":"ref38","article-title":"On the impact of knowledge distillation for model interpretability","volume-title":"International Conference on Machine Learning","author":"Hyeongrok"},{"key":"ref39","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der Maaten","year":"2008","journal-title":"Journal of Machine Learning Research"}],"event":{"name":"ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Hyderabad, India","start":{"date-parts":[[2025,4,6]]},"end":{"date-parts":[[2025,4,11]]}},"container-title":["ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10887540\/10887541\/10887876.pdf?arnumber=10887876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T05:26:23Z","timestamp":1774416383000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10887876\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,6]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/icassp49660.2025.10887876","relation":{},"subject":[],"published":{"date-parts":[[2025,4,6]]}}}