{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T06:21:45Z","timestamp":1774419705378,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,6]]},"DOI":"10.1109\/icassp49660.2025.10889120","type":"proceedings-article","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T13:52:43Z","timestamp":1741787563000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["AD\n                    <sup>2<\/sup>\n                    T: Adversarial Distortion Domain Translation for Robust Watermarking against Non-differentiable Distortions"],"prefix":"10.1109","author":[{"given":"Chengxin","family":"Zhao","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology,School of Computer Science and Technology"}]},{"given":"Hefei","family":"Ling","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology,School of Computer Science and Technology"}]},{"given":"Jiazhong","family":"Chen","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology,School of Computer Science and Technology"}]},{"given":"Han","family":"Fang","sequence":"additional","affiliation":[{"name":"National University of Singapore,School of Computing"}]},{"given":"Zongyi","family":"Li","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology,School of Computer Science and Technology"}]},{"given":"Sijing","family":"Xie","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology,School of Computer Science and Technology"}]}],"member":"263","reference":[{"key":"ref1","article-title":"UDH: universal deep hiding for steganography, watermarking, and light field messaging","author":"Zhang","year":"2020","journal-title":"NeurIPS"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3265970"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3681138"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2024.3411816"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxae014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3351025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00219"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475324"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475628"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548049"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2022.3149641"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2024.3415415"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00161"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612068"},{"key":"ref16","article-title":"Explaining and harnessing adversarial examples","volume-title":"ICLR","author":"Goodfellow"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i8.16904"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3341639"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103750"},{"key":"ref20","article-title":"Romark: A robust watermarking system using adversarial training","volume":"abs\/1910.01221","author":"Wen","year":"2019","journal-title":"CoRR"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01356"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref23","first-page":"5767","article-title":"Improved training of wasserstein gans","volume-title":"NIPS","author":"Gulrajani"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2023.3285981"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1460096.1460104"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3055255"},{"key":"ref30","first-page":"6626","article-title":"Gans trained by a two time-scale update rule converge to a local nash equilibrium","volume-title":"NIPS","author":"Heusel"}],"event":{"name":"ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Hyderabad, India","start":{"date-parts":[[2025,4,6]]},"end":{"date-parts":[[2025,4,11]]}},"container-title":["ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10887540\/10887541\/10889120.pdf?arnumber=10889120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T05:24:13Z","timestamp":1774416253000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10889120\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icassp49660.2025.10889120","relation":{},"subject":[],"published":{"date-parts":[[2025,4,6]]}}}