{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T08:13:55Z","timestamp":1771402435417,"version":"3.50.1"},"reference-count":7,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,14]],"date-time":"2025-09-14T00:00:00Z","timestamp":1757808000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,14]],"date-time":"2025-09-14T00:00:00Z","timestamp":1757808000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,14]]},"DOI":"10.1109\/icipw68931.2025.11385944","type":"proceedings-article","created":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T21:05:43Z","timestamp":1771362343000},"page":"70-74","source":"Crossref","is-referenced-by-count":0,"title":["Twinshield: A Dual-Phase System for Detecting and Extracting Backdoors in VLMS"],"prefix":"10.1109","author":[{"given":"Malavika","family":"Nithyanand","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Madras Zanzibar"}]},{"given":"Vikalp","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Madras Zanzibar"}]},{"given":"Shivam","family":"Vyas","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Madras Zanzibar"}]},{"given":"Tushar","family":"Shinde","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Madras Zanzibar"}]}],"member":"263","reference":[{"key":"ref1","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"International conference on machine learning","author":"Radford"},{"key":"ref2","article-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain","author":"Gu","year":"2017","journal-title":"arXiv preprint arXiv:1708.06733"},{"key":"ref3","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"Chen","year":"2017","journal-title":"arXiv preprint arXiv:1712.05526"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359790"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00951"}],"event":{"name":"2025 IEEE International Conference on Image Processing Workshops (ICIPW)","location":"Anchorage, AK, USA","start":{"date-parts":[[2025,9,14]]},"end":{"date-parts":[[2025,9,17]]}},"container-title":["2025 IEEE International Conference on Image Processing Workshops (ICIPW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11385856\/11385840\/11385944.pdf?arnumber=11385944","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T07:20:59Z","timestamp":1771399259000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11385944\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,14]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/icipw68931.2025.11385944","relation":{},"subject":[],"published":{"date-parts":[[2025,9,14]]}}}