{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T10:04:38Z","timestamp":1777889078874,"version":"3.51.4"},"reference-count":92,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation, Singapore","doi-asserted-by":"publisher","award":["CityU 11211624"],"award-info":[{"award-number":["CityU 11211624"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62406090"],"award-info":[{"award-number":["62406090"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,19]]},"DOI":"10.1109\/iccv51701.2025.01034","type":"proceedings-article","created":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T19:45:49Z","timestamp":1777491949000},"page":"11110-11121","source":"Crossref","is-referenced-by-count":0,"title":["Temporal Unlearnable Examples: Preventing Personal Video Data from Unauthorized Exploitation by Object Tracking"],"prefix":"10.1109","author":[{"given":"Qiangqiang","family":"Wu","sequence":"first","affiliation":[{"name":"City University of Hong Kong,Department of Computer Science"}]},{"given":"Yi","family":"Yu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University,ROSE Lab"}]},{"given":"Chenqi","family":"Kong","sequence":"additional","affiliation":[{"name":"Nanyang Technological University,ROSE Lab"}]},{"given":"Ziquan","family":"Liu","sequence":"additional","affiliation":[{"name":"Queen Mary University of London"}]},{"given":"Jia","family":"Wan","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology,Shenzhen"}]},{"given":"Haoliang","family":"Li","sequence":"additional","affiliation":[{"name":"City University of Hong Kong,Department of Computer Science"}]},{"given":"Alex C.","family":"Kot","sequence":"additional","affiliation":[{"name":"Nanyang Technological University,ROSE Lab"}]},{"given":"Antoni B.","family":"Chan","sequence":"additional","affiliation":[{"name":"City University of Hong Kong,Department of Computer Science"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01802"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.156"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48881-3_56"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01822"},{"key":"ref6","article-title":"A simple framework for contrastive learning of visual representations","volume-title":"International Conference on Machine Learning","author":"Chen","year":"2020"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00803"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01400"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19815-1_37"},{"key":"ref11","first-page":"11781","article-title":"Rethinking space-time networks with improved memory coverage for efficient video object segmentation","author":"Cheng","year":"2021","journal-title":"NeurIPS"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01324"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2015.84"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.490"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46454-1_29"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.733"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2609928"},{"key":"ref18","article-title":"An image is worth 16\u00d716 words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2021","journal-title":"ICLR"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00552"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-020-01387-y"},{"key":"ref21","article-title":"Learning to confuse: generating training time adversarial data with autoencoder","volume":"32","author":"Feng","year":"2019","journal-title":"NeurIPS"},{"key":"ref22","article-title":"Adversarial examples make strong poisons","volume":"34:3033930351","author":"Fowl","year":"2021","journal-title":"NeurIPS"},{"key":"ref23","article-title":"Robust unlearnable examples: Protecting data privacy against adversarial learning","author":"Fu","year":"2022","journal-title":"ICLR"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.129"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01792"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58595-2_13"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2345390"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01805"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.52202\/075280-1810"},{"key":"ref31","article-title":"Unlearnable examples: Making personal data unexploitable","author":"Huang","year":"2021","journal-title":"ICLR"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2957464"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58529-7_5"},{"key":"ref34","volume-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00935"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00441"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3746027.3755349"},{"key":"ref39","volume-title":"A survey on unlearnable data","author":"Li","year":"2025"},{"key":"ref40","article-title":"Few-shot backdoor attacks on visual object tracking","author":"Li","year":"2022","journal-title":"arXiv preprint"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58574-7_3"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3103601"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2024.101038"},{"key":"ref44","article-title":"Safeguarding medical image segmentation datasets against unauthorized training via contour-and texture-aware perturbations","author":"Lin","year":"2024","journal-title":"arXiv preprint"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3680806"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747821"},{"key":"ref47","article-title":"Image shortcut squeezing: Countering perturbative availability poisons with compression","volume-title":"International Conference on Machine Learning","author":"Liu","year":"2023"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.515"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3421273"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01246-5_19"},{"key":"ref52","article-title":"Temporally-transferable perturbations: Efficient, one-shot adversarial attacks for online visual object trackers","author":"Nakka","year":"2020","journal-title":"arXiv preprint"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00387"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10165"},{"key":"ref55","volume-title":"The2017 davis challenge on video object segmentation","author":"Pont-Tuset","year":"2017"},{"key":"ref56","first-page":"27374","article-title":"Autoregressive perturbations for data poisoning","volume":"35","author":"Sandoval-Segura","year":"2022","journal-title":"NeurIPS"},{"key":"ref57","first-page":"1589","article-title":"Fawkes: Protecting privacy against unauthorized deep learning models","volume-title":"29th USENIX security symposium (USENIX Security 20)","author":"Shan","year":"2020"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref60","article-title":"Unseg: One universal unlearnable example generator is enough against all image segmentation","author":"Sun","year":"2024","journal-title":"arXiv preprint"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3009717"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.158"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.531"},{"key":"ref64","volume-title":"Dcfnet: Discriminant correlation filters network for visual tracking","author":"Wang","year":"2017"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01355"},{"key":"ref66","article-title":"Unlearnable 3d point clouds: Class-wise transformation is all you need","author":"Wang","year":"2024","journal-title":"arXiv preprint"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00935"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICME51207.2021.9428441"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20873-8_8"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20873-8_8"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01399"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01276"},{"key":"ref73","article-title":"One-pixel shortcut: On the learning preference of deep neural networks","author":"Wu","year":"2023","journal-title":"ICLR"},{"key":"ref74","article-title":"Sta: Adversarial attacks on siamese trackers","author":"Wu","year":"2019","journal-title":"arXiv preprint"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2388226"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01808"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52733.2024.01826"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01228-1_36"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00107"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01028"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053574"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01240-3_10"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00675"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20047-2_20"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539241"},{"key":"ref86","article-title":"Purify unlearnable examples via rate-constrained variational autoencoders","volume-title":"International Conference on Machine Learning, ICML 2024","author":"Yu","year":"2024"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-72359-9_18"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3553043"},{"key":"ref89","article-title":"Mtlue: Learning to learn nothing for multi-task learning","volume-title":"International Conference on Machine Learning. PMLR","author":"Yu","year":"2025"},{"key":"ref90","first-page":"12230","article-title":"Neural tangent generalization attacks","volume-title":"International Conference on Machine Learning","author":"Yuan","year":"2021"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00411"},{"key":"ref92","article-title":"Hivit: Hierarchical vision transformer meets masked image modeling","author":"Zhang","year":"2022","journal-title":"arXiv preprint"}],"event":{"name":"2025 IEEE\/CVF International Conference on Computer Vision (ICCV)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,10,19]]},"end":{"date-parts":[[2025,10,25]]}},"container-title":["2025 IEEE\/CVF International Conference on Computer Vision (ICCV)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11443115\/11443287\/11444405.pdf?arnumber=11444405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T05:06:29Z","timestamp":1777611989000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11444405\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,19]]},"references-count":92,"URL":"https:\/\/doi.org\/10.1109\/iccv51701.2025.01034","relation":{},"subject":[],"published":{"date-parts":[[2025,10,19]]}}}