{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T18:45:56Z","timestamp":1757616356448,"version":"3.44.0"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFC3310700"],"award-info":[{"award-number":["2023YFC3310700"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62276067"],"award-info":[{"award-number":["62276067"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Grants Council (RGC) of Hong Kong Government through the Research Impact Fund Project","award":["RIF R6003-21"],"award-info":[{"award-number":["RIF R6003-21"]}]},{"DOI":"10.13039\/501100001321","name":"General Research Fund Project","doi-asserted-by":"publisher","award":["GRF 16203224"],"award-info":[{"award-number":["GRF 16203224"]}],"id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3599257","type":"journal-article","created":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T18:19:47Z","timestamp":1755281987000},"page":"9195-9206","source":"Crossref","is-referenced-by-count":0,"title":["MF-CLIP: Leveraging CLIP as Surrogate Models for No-Box Adversarial Attacks"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0991-7109","authenticated-orcid":false,"given":"Jiaming","family":"Zhang","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0571-8156","authenticated-orcid":false,"given":"Lingyu","family":"Qiu","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Applications, University of Naples Federico II, Naples, Italy"}]},{"given":"Qi","family":"Yi","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology and the Beijing Key Laboratory of Traffic Data Mining and Embodied Intelligence, Beijing Jiaotong University, Beijing, China"}]},{"given":"Yige","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Bras Basah, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0699-3205","authenticated-orcid":false,"given":"Jitao","family":"Sang","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology and the Beijing Key Laboratory of Traffic Data Mining and Embodied Intelligence, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8343-9665","authenticated-orcid":false,"given":"Changsheng","family":"Xu","sequence":"additional","affiliation":[{"name":"MAIS, Institute of Automation, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3716-8125","authenticated-orcid":false,"given":"Dit-Yan","family":"Yeung","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3204753"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3278310"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2024.3510355"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2024.3415415"},{"key":"ref5","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv:1312.6199"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3516577"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3520016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3518072"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3526067"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3536611"},{"key":"ref11","first-page":"12849","article-title":"Practical no-box adversarial attacks against DNNs","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Li"},{"key":"ref12","article-title":"Hierarchical text-conditional image generation with CLIP latents","author":"Ramesh","year":"2022","journal-title":"arXiv:2204.06125"},{"key":"ref13","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"Proc. Int. Conf. Mach. Learn.","volume":"139","author":"Radford"},{"key":"ref14","article-title":"On the opportunities and risks of foundation models","author":"Bommasani","year":"2021","journal-title":"arXiv:2108.07258"},{"key":"ref15","article-title":"Qwen2.5 technical report","volume-title":"arXiv:2412.15115","author":"Qwen","year":"2024"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02484"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS61860.2024.10810719"},{"key":"ref18","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref19","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00284"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02291"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02297"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00425"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i4.28133"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00483"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00754"},{"key":"ref28","first-page":"32900","article-title":"Improving adversarial transferability via intermediate-level perturbation decay","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Li"},{"article-title":"Beyond ImageNet attack: Towards crafting adversarial examples for black-box domains","volume-title":"arXiv:2201.11528","author":"Zhang","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i6.28365"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"issue":"86","key":"ref32","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6248092"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICVGIP.2008.47"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2013.77"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10599-4_29"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539970"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2019.2918242"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1212.0402"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref41","first-page":"6105","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tan"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01044"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3718751.3718815"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i8.26139"},{"article-title":"Robustness may be at odds with accuracy","volume-title":"arXiv:1805.12152","author":"Tsipras","key":"ref45"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/11126893.pdf?arnumber=11126893","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T18:18:46Z","timestamp":1757096326000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11126893\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3599257","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2025]]}}}