{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T06:14:05Z","timestamp":1775628845026,"version":"3.50.1"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1109\/icmla66185.2025.00215","type":"proceedings-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T19:54:58Z","timestamp":1775591698000},"page":"1411-1416","source":"Crossref","is-referenced-by-count":0,"title":["Breaking and Securing Vision-Language Models: An Adversarial Robustness Study"],"prefix":"10.1109","author":[{"given":"Md Zarif","family":"Hossain","sequence":"first","affiliation":[{"name":"Florida Atlantic University,Department of Electrical Engineering and Computer Science,FL,USA"}]},{"given":"Abdur R.","family":"Shahid","sequence":"additional","affiliation":[{"name":"Southern Illinois University,School of Computing,Carbondale,IL,USA"}]},{"given":"Ahmed","family":"Imteaj","sequence":"additional","affiliation":[{"name":"Florida Atlantic University,Department of Electrical Engineering and Computer Science,FL,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Minigpt-4: Enhancing vision-language understanding with advanced large language models","author":"Zhu","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-72970-6_8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.52202\/068431-1723"},{"key":"ref4","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW60793.2023.00395"},{"key":"ref6","article-title":"Understanding zero-shot adversarial robustness for large-scale models","volume-title":"The Eleventh International Conference on Learning Representations","author":"Mao"},{"key":"ref7","first-page":"54 111","article-title":"On evaluating adversarial robustness of large vision-language models","volume":"36","author":"Zhao","year":"2023","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW67362.2025.00067"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00715"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00079"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00191"},{"key":"ref12","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"International conference on machine learning","author":"Radford"},{"key":"ref13","article-title":"Jailbreaking attack against multimodal large language model","author":"Niu","year":"2024"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i22.34568"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i19.30150"},{"key":"ref16","article-title":"Physical back-door attack can jeopardize driving with vision-large-language models","author":"Ni","year":"2024"},{"issue":"8","key":"ref17","first-page":"9","article-title":"Language models are unsupervised multitask learners","volume":"1","author":"Radford","year":"2019","journal-title":"OpenAI blog"},{"key":"ref18","article-title":"Shadowcast: Stealthy data poisoning attacks against vision-language models","author":"Xu","year":"2024"},{"key":"ref19","article-title":"Poisoning and backdooring contrastive learning","author":"Carlini","year":"2021"},{"key":"ref20","first-page":"39 299","article-title":"Data poisoning attacks against multimodal encoders","volume-title":"International Conference on Machine Learning","author":"Yang"},{"key":"ref21","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02325"},{"key":"ref23","article-title":"Openflamingo: An open-source framework for training large autoregressive vision-language models","author":"Awadalla","year":"2023"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612454"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.52202\/068431-0088"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2025.naacl-long.360"},{"key":"ref27","article-title":"Diffusion models for adversarial purification","author":"Nie","year":"2022"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/BigData62323.2024.10825099"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52734.2025.02787"},{"key":"ref30","article-title":"Robust contrastive language-image pretraining against data poisoning and backdoor attacks","volume":"36","author":"Yang","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00017"},{"key":"ref32","article-title":"Robust clip: Unsupervised adversarial fine-tuning of vision embeddings for robust large vision-language models","author":"Schlarmann","year":"2024"},{"key":"ref33","article-title":"Sim-clip: Unsupervised siamese adversarial fine-tuning for robust and semantically-rich vision-language models","author":"Hossain","year":"2024"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52734.2025.02258"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00130"}],"event":{"name":"2025 International Conference on Machine Learning and Applications (ICMLA)","location":"Boca Raton, FL, USA","start":{"date-parts":[[2025,12,3]]},"end":{"date-parts":[[2025,12,5]]}},"container-title":["2025 International Conference on Machine Learning and Applications (ICMLA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471302\/11471304\/11471518.pdf?arnumber=11471518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:38:41Z","timestamp":1775626721000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11471518\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/icmla66185.2025.00215","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]}}}