{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T06:23:21Z","timestamp":1774419801340,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,6]]},"DOI":"10.1109\/icassp49660.2025.10888028","type":"proceedings-article","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T13:52:43Z","timestamp":1741787563000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Tip the Scales: Achieving Balance in Adversarial Examples Across Modalities"],"prefix":"10.1109","author":[{"given":"Zhenbo","family":"Shi","sequence":"first","affiliation":[{"name":"University of Science and Technology of China,School of Computer Science and Technology,Hefei,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhidong","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China,School of Computer Science and Technology,Hefei,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuxuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China,School of Computer Science and Technology,Hefei,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shuchang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China,School of Computer Science and Technology,Hefei,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaoman","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China,School of Software Engineering,Suzhou,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wei","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China,School of Computer Science and Technology,Hefei,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China,School of Computer Science and Technology,Hefei,China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP40778.2020.9191288"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00034"},{"key":"ref3","article-title":"Pre-trained adversarial perturbations","author":"Ban","year":"2022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3547801"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612454"},{"key":"ref6","article-title":"Understanding zero-shot adversarial robustness for large-scale models","volume-title":"The Eleventh International Conference on Learning Representations","author":"Mao"},{"key":"ref7","article-title":"Backdoor attacks to pre-trained unified foundation models","author":"Yuan","year":"2023"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i7.28488"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i7.28499"},{"key":"ref10","article-title":"Dall-eval: Probing the reasoning skills and social biases of text-to-image generative transformers","author":"Cho","year":"2022"},{"key":"ref11","article-title":"Filip: Fine-grained interactive language-image pre-training","author":"Yao","year":"2021"},{"key":"ref12","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"International Conference on machine learning","author":"Radford"},{"key":"ref13","article-title":"Supervision exists everywhere: A data efficient contrastive language-image pre-training paradigm","author":"Li","year":"2021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19809-0_30"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.303"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00335"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref19","article-title":"Nesterov accelerated gradient and scale invariance for adversarial attacks","volume-title":"International Conference on Learning Representations","author":"Lin"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2812802"},{"key":"ref21","article-title":"Democratizing contrastive language-image pre-training: A clip benchmark of data, model, and supervision","author":"Cui","year":"2022"},{"key":"ref22","first-page":"139","article-title":"Collecting image annotations using amazon\u2019s mechanical turk","volume-title":"Proceedings of the NAACL HLT 2010 workshop on creating speech and language data with Amazon\u2019s Mechanical Turk","author":"Rashtchian"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1873987"},{"key":"ref24","article-title":"The caltech-ucsd birds-200-2011 dataset","author":"Wah","year":"2011"}],"event":{"name":"ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Hyderabad, India","start":{"date-parts":[[2025,4,6]]},"end":{"date-parts":[[2025,4,11]]}},"container-title":["ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10887540\/10887541\/10888028.pdf?arnumber=10888028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T05:24:46Z","timestamp":1774416286000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10888028\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icassp49660.2025.10888028","relation":{},"subject":[],"published":{"date-parts":[[2025,4,6]]}}}