{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T07:33:16Z","timestamp":1771399996150,"version":"3.50.1"},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,14]],"date-time":"2025-09-14T00:00:00Z","timestamp":1757808000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,14]],"date-time":"2025-09-14T00:00:00Z","timestamp":1757808000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,14]]},"DOI":"10.1109\/icipw68931.2025.11385957","type":"proceedings-article","created":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T21:05:43Z","timestamp":1771362343000},"page":"75-79","source":"Crossref","is-referenced-by-count":0,"title":["Unmasking Backdoors: Generative Anomaly Detection for VLM Poison Samples and Trigger Characterization"],"prefix":"10.1109","author":[{"given":"Pooja","family":"Bandal","sequence":"first","affiliation":[{"name":"SGS&#x0026;Co2 Dorchester Avenue,Toronto"}]},{"given":"Anshul","family":"Verma","sequence":"additional","affiliation":[{"name":"SGS&#x0026;Co2 Dorchester Avenue,Toronto"}]}],"member":"263","reference":[{"key":"ref1","year":"2025","journal-title":"Poison sample detection and trigger retrieval in multimodal vlms"},{"key":"ref2","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"International conference on machine learning","author":"Radford"},{"key":"ref3","first-page":"12888","article-title":"Blip: Bootstrapping language-image pre-training for unified vision-language understanding and generation","volume-title":"International conference on machine learning.","author":"Li"},{"key":"ref4","article-title":"A survey on backdoor threats in large language models (llms): Attacks, defenses, and evaluations","author":"Zhou","year":"2025","journal-title":"arXiv preprint arXiv:2502.05224"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02327"},{"key":"ref6","article-title":"Adversarial backdoor defense in clip","author":"Kuang","year":"2024","journal-title":"arXiv preprint"},{"key":"ref7","article-title":"Defending multimodal backdoored models by repulsive visual prompt tuning","author":"Zhang","year":"2024","journal-title":"arXiv preprint"},{"key":"ref8","article-title":"Robust contrastive language-image pretraining against data poisoning and backdoor attacks","author":"Yang","year":"2024","journal-title":"CVPR 2024"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"}],"event":{"name":"2025 IEEE International Conference on Image Processing Workshops (ICIPW)","location":"Anchorage, AK, USA","start":{"date-parts":[[2025,9,14]]},"end":{"date-parts":[[2025,9,17]]}},"container-title":["2025 IEEE International Conference on Image Processing Workshops (ICIPW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11385856\/11385840\/11385957.pdf?arnumber=11385957","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T06:59:42Z","timestamp":1771397982000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11385957\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,14]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/icipw68931.2025.11385957","relation":{},"subject":[],"published":{"date-parts":[[2025,9,14]]}}}