{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T18:57:42Z","timestamp":1763060262452,"version":"3.45.0"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202055"],"award-info":[{"award-number":["62202055"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2025A1515012843"],"award-info":[{"award-number":["2025A1515012843"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Start-up Fund from Beijing Normal University","award":["312200502510"],"award-info":[{"award-number":["312200502510"]}]},{"name":"Internal Fund from Beijing Normal-Hong Kong Baptist University","award":["UICR0400003-24"],"award-info":[{"award-number":["UICR0400003-24"]}]},{"name":"Project of Young Innovative Talents of Guangdong Education Department","award":["2022KQNCX102"],"award-info":[{"award-number":["2022KQNCX102"]}]},{"name":"Interdisciplinary Intelligence SuperComputer Center of Beijing Normal University"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1109\/tbdata.2025.3558832","type":"journal-article","created":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T14:07:18Z","timestamp":1744121238000},"page":"2856-2869","source":"Crossref","is-referenced-by-count":0,"title":["Look Closer to Your Enemy: Learning to Attack via Teacher-Student Mimicking"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2419-8117","authenticated-orcid":false,"given":"Mingjie","family":"Wang","sequence":"first","affiliation":[{"name":"Department of Computer Science, Guangdong Key Lab of AI and Multi-Modal Data Processing, Beijing Normal-Hong Kong Baptist University, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0994-3297","authenticated-orcid":false,"given":"Jianxiong","family":"Guo","sequence":"additional","affiliation":[{"name":"Advanced Institute of Natural Sciences, Beijing Normal University, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7618-9831","authenticated-orcid":false,"given":"Sirui","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Guangdong Key Lab of AI and Multi-Modal Data Processing, Beijing Normal-Hong Kong Baptist University, Zhuhai, China"}]},{"given":"Dingwen","family":"Xiao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Guangdong Key Lab of AI and Multi-Modal Data Processing, Beijing Normal-Hong Kong Baptist University, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9375-4818","authenticated-orcid":false,"given":"Zhiqing","family":"Tang","sequence":"additional","affiliation":[{"name":"Advanced Institute of Natural Sciences, Beijing Normal University, Zhuhai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr46437.2021.00065"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01474"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5891"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00042"},{"article-title":"Metric attack and defense for person re-identification","year":"2019","author":"Bai","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01225-0_30"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00643"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.133"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48881-3_2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.389"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58598-3_38"},{"key":"ref14","first-page":"524","article-title":"The cascade-correlation learning architecture","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Fahlman"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2010.2073482"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.144"},{"key":"ref17","first-page":"874","article-title":"AdaNet: Adaptive structural learning of artificial neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Cortes"},{"key":"ref18","first-page":"2377","article-title":"Training very deep networks","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Srivastava"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_38"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.307"},{"article-title":"In defense of the triplet loss for person re-identification","year":"2017","author":"Hermans","key":"ref22"},{"article-title":"An image is worth 16x16 words: Transformers for image recognition at scale","year":"2020","author":"Dosovitskiy","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58621-8_27"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2869574"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.452"},{"article-title":"Adaptive chameleon or stubborn sloth: Revealing the behavior of large language models in knowledge conflicts","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Xie","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"Goodfellow","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"article-title":"Simple black-box adversarial perturbations for deep networks","year":"2016","author":"Narodytska","key":"ref33"},{"article-title":"Spatially transformed adversarial examples","year":"2018","author":"Xiao","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.02.051"},{"article-title":"Query attack via opposite-direction feature: Towards robust image retrieval","year":"2018","author":"Zheng","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-8991-9_29"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.27"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00016"},{"article-title":"AlignedReID: Surpassing human-level performance in person re-identification","year":"2017","author":"Zhang","key":"ref40"},{"article-title":"Person re-identification: Past, present and future","year":"2016","author":"Zheng","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.577"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00243"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00541"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00110"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.405"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01261-8_11"},{"article-title":"Towards deep learning models resistant to adversarial attacks","year":"2017","author":"Madry","key":"ref48"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6687317\/11244109\/10955459.pdf?arnumber=10955459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T18:45:48Z","timestamp":1763059548000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10955459\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":48,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2025.3558832","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"type":"electronic","value":"2332-7790"},{"type":"electronic","value":"2372-2096"}],"subject":[],"published":{"date-parts":[[2025,12]]}}}