{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:46:26Z","timestamp":1761129986032,"version":"3.37.3"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100007225","name":"Ministry of Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007225","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019069","name":"Chinese Academy of Engineering","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100019069","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,2]]},"DOI":"10.1109\/isi53945.2021.9624750","type":"proceedings-article","created":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T23:55:42Z","timestamp":1638316542000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Attacking DNN-based Cross-modal Retrieval Hashing Framework with Adversarial Perturbations"],"prefix":"10.1109","author":[{"given":"Xingwei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiaolong","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Wenji","family":"Mao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Adversarial robustness may be at odds with simplicity","year":"2019","author":"nakkiran","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298598"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v32i1.11814","article-title":"Asymmetric deep supervised hashing","author":"jiang","year":"2018","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"journal-title":"Correlation hashing network for efficient cross-modal retrieval","year":"2016","author":"cao","key":"ref31"},{"key":"ref30","first-page":"521","article-title":"Vasconcelos, and m. intelligence, On the role of correlation and abstraction in cross-modal multimedia retrieval","volume":"36","author":"pereira","year":"2013"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00315"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00928"},{"journal-title":"Deep supervised discrete hashing","year":"2017","author":"li","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.227"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v27i1.8464","article-title":"Heterogeneous metric learning with joint graph regularization for cross-media retrieval","author":"zhai","year":"2013","journal-title":"Twenty-Seventh AAAI Conference on Artificial Intelligence"},{"key":"ref11","first-page":"35","article-title":"Perronnin and m. intelligence, Iterative quantization: A procrustean approach to learning binary codes for large-scale image retrieval","author":"gong","year":"2012"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390285"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2593344"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2607421"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299011"},{"article-title":"Feature learning based deep supervised hashing with pairwise labels","year":"2015","author":"li","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"article-title":"Intriguing properties of neural networks","year":"2013","author":"szegedy","key":"ref18"},{"article-title":"Adversarial examples in the physical world","year":"2016","author":"kurakin","key":"ref19"},{"journal-title":"Large-scale supervised multimodal hashing with semantic correlation maximization","year":"2014","author":"zhang","key":"ref28"},{"key":"ref4","first-page":"33","article-title":"Security, Cross-media retrieval: state-of-the-art and open issues","volume":"1","author":"liu","year":"2010"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939812"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00446"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.348"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"goodfellow","key":"ref29"},{"journal-title":"A Survey on Multi-view Learning","year":"2013","author":"xu","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2006.49"},{"journal-title":"Deep Unsupervised Image Hashing by Maximizing Bit Entropy","year":"2020","author":"li","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3323873.3325045"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276876"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00312"},{"article-title":"Delving into transferable adversarial examples and black-box attacks","year":"2016","author":"liu","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.153"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"journal-title":"A comprehensive survey on cross-modal retrieval","year":"2016","author":"wang","key":"ref24"},{"article-title":"Adversarial examples are not bugs, they are features","year":"2019","author":"ilyas","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2465274"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1873987"}],"event":{"name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2021,11,2]]},"location":"San Antonio, TX, USA","end":{"date-parts":[[2021,11,3]]}},"container-title":["2021 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9624673\/9624675\/09624750.pdf?arnumber=9624750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T20:01:36Z","timestamp":1673899296000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9624750\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,2]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/isi53945.2021.9624750","relation":{},"subject":[],"published":{"date-parts":[[2021,11,2]]}}}