{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T09:08:36Z","timestamp":1754557716185,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T00:00:00Z","timestamp":1559692800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","award":["16397"],"award-info":[{"award-number":["16397"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,5]]},"DOI":"10.1145\/3323873.3325052","type":"proceedings-article","created":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T12:10:58Z","timestamp":1560168658000},"page":"306-314","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Who's Afraid of Adversarial Queries?"],"prefix":"10.1145","author":[{"given":"Zhuoran","family":"Liu","sequence":"first","affiliation":[{"name":"Radboud University, Nijmegen, Netherlands"}]},{"given":"Zhengyu","family":"Zhao","sequence":"additional","affiliation":[{"name":"Radboud University, Nijmegen, Netherlands"}]},{"given":"Martha","family":"Larson","sequence":"additional","affiliation":[{"name":"Radboud University &amp; Delft University of Technology, NIjmegen, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2019,6,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Neural Codes for Image Retrieval. In European Conference on Computer Vision (ECCV) . Springer, 584--599","author":"Babenko Artem","year":"2014","unstructured":"Artem Babenko , Anton Slesarev , Alexandr Chigorin , and Victor Lempitsky . 2014 . Neural Codes for Image Retrieval. In European Conference on Computer Vision (ECCV) . Springer, 584--599 . Artem Babenko, Anton Slesarev, Alexandr Chigorin, and Victor Lempitsky. 2014. Neural Codes for Image Retrieval. In European Conference on Computer Vision (ECCV) . Springer, 584--599."},{"key":"e_1_3_2_1_2_1","volume-title":"Towards Evaluating the Robustness of Neural Networks. In 2017 IEEE Symposium on Security and Privacy (S&P). IEEE, 39--57","author":"Carlini Nicholas","year":"2017","unstructured":"Nicholas Carlini and David Wagner . 2017 . Towards Evaluating the Robustness of Neural Networks. In 2017 IEEE Symposium on Security and Privacy (S&P). IEEE, 39--57 . Nicholas Carlini and David Wagner. 2017. Towards Evaluating the Robustness of Neural Networks. In 2017 IEEE Symposium on Security and Privacy (S&P). IEEE, 39--57."},{"key":"e_1_3_2_1_3_1","volume-title":"CEDD: Color and Edge Directivity Ddescriptor: A Compact Descriptor for Image Indexing and Retrieval. In International Conference on Computer Vision Systems. Springer, 312--322","author":"Chatzichristofis Savvas A","year":"2008","unstructured":"Savvas A Chatzichristofis and Yiannis S Boutalis . 2008 . CEDD: Color and Edge Directivity Ddescriptor: A Compact Descriptor for Image Indexing and Retrieval. In International Conference on Computer Vision Systems. Springer, 312--322 . Savvas A Chatzichristofis and Yiannis S Boutalis. 2008. CEDD: Color and Edge Directivity Ddescriptor: A Compact Descriptor for Image Indexing and Retrieval. In International Conference on Computer Vision Systems. Springer, 312--322."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3080543"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2337654"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288254"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1877972.1877977"},{"key":"e_1_3_2_1_8_1","volume-title":"Understanding the Security and Robustness of SIFT. In ACM International Conference on Multimedia (ACM MM). ACM, 1195--1198","author":"Do Thanh-Toan","year":"2010","unstructured":"Thanh-Toan Do , Ewa Kijak , Teddy Furon , and Laurent Amsaleg . 2010 b. Understanding the Security and Robustness of SIFT. In ACM International Conference on Multimedia (ACM MM). ACM, 1195--1198 . Thanh-Toan Do, Ewa Kijak, Teddy Furon, and Laurent Amsaleg. 2010b. Understanding the Security and Robustness of SIFT. In ACM International Conference on Multimedia (ACM MM). ACM, 1195--1198."},{"key":"e_1_3_2_1_9_1","volume-title":"Robust Physical-World Attacks on Deep Learning Visual Classification. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 1625--1634","author":"Eykholt Kevin","year":"2018","unstructured":"Kevin Eykholt , Ivan Evtimov , Earlence Fernandes , Bo Li , Amir Rahmati , Chaowei Xiao , Atul Prakash , Tadayoshi Kohno , and Dawn Song . 2018 . Robust Physical-World Attacks on Deep Learning Visual Classification. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 1625--1634 . Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Chaowei Xiao, Atul Prakash, Tadayoshi Kohno, and Dawn Song. 2018. Robust Physical-World Attacks on Deep Learning Visual Classification. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 1625--1634."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.922456"},{"key":"e_1_3_2_1_11_1","volume-title":"Cybercasing the Joint: On the Privacy Implications of Geo-Tagging. In USENIX Conference on Hot Topics in Security (HotSec). USENIX, 1--6.","author":"Friedland Gerald","year":"2010","unstructured":"Gerald Friedland and Robin Sommer . 2010 . Cybercasing the Joint: On the Privacy Implications of Geo-Tagging. In USENIX Conference on Hot Topics in Security (HotSec). USENIX, 1--6. Gerald Friedland and Robin Sommer. 2010. Cybercasing the Joint: On the Privacy Implications of Geo-Tagging. In USENIX Conference on Hot Topics in Security (HotSec). USENIX, 1--6."},{"key":"e_1_3_2_1_12_1","volume-title":"Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations (ICLR) .","author":"Goodfellow Ian","year":"2015","unstructured":"Ian Goodfellow , Jonathon Shlens , and Christian Szegedy . 2015 . Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations (ICLR) . Ian Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations (ICLR) ."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1631272.1631376"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88682-2_24"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5540039"},{"key":"e_1_3_2_1_16_1","volume-title":"Adam: A Method for Stochastic Optimization. In International Conference on Learning Representations (ICLR) .","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba . 2014 . Adam: A Method for Stochastic Optimization. In International Conference on Learning Representations (ICLR) . Diederik P Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimization. In International Conference on Learning Representations (ICLR) ."},{"key":"e_1_3_2_1_17_1","volume-title":"On Detection of Median Filtering in Digital Images","author":"Kirchner Matthias","year":"2010","unstructured":"Matthias Kirchner and Jessica Fridrich . 2010. On Detection of Median Filtering in Digital Images ., Vol. 7541 ( 2010 ), 754110. Matthias Kirchner and Jessica Fridrich. 2010. On Detection of Median Filtering in Digital Images., Vol. 7541 (2010), 754110."},{"key":"e_1_3_2_1_18_1","volume-title":"Universal Perturbation Attack Against Image Retrieval. arXiv preprint arXiv:1812.00552","author":"Li Jie","year":"2019","unstructured":"Jie Li , Rongrong Ji , Hong Liu , Xiaopeng Hong , Yue Gao , and Qi Tian . 2019. Universal Perturbation Attack Against Image Retrieval. arXiv preprint arXiv:1812.00552 ( 2019 ). Jie Li, Rongrong Ji, Hong Liu, Xiaopeng Hong, Yue Gao, and Qi Tian. 2019. Universal Perturbation Attack Against Image Retrieval. arXiv preprint arXiv:1812.00552 (2019)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2730362"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2553645"},{"key":"e_1_3_2_1_21_1","volume-title":"International Conference on Learning Representations (ICLR) .","author":"Liu Yanpei","year":"2017","unstructured":"Yanpei Liu , Xinyun Chen , Chang Liu , and Dawn Song . 2017 . Delving into Transferable Adversarial Examples and Black-box Attacks . In International Conference on Learning Representations (ICLR) . Yanpei Liu, Xinyun Chen, Chang Liu, and Dawn Song. 2017. Delving into Transferable Adversarial Examples and Black-box Attacks. In International Conference on Learning Representations (ICLR) ."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393347.2393434"},{"key":"e_1_3_2_1_23_1","volume-title":"Universal Adversarial Perturbations. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 1765--1773","author":"Moosavi-Dezfooli Seyed-Mohsen","year":"2017","unstructured":"Seyed-Mohsen Moosavi-Dezfooli , Alhussein Fawzi , Omar Fawzi , and Pascal Frossard . 2017 . Universal Adversarial Perturbations. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 1765--1773 . Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, Omar Fawzi, and Pascal Frossard. 2017. Universal Adversarial Perturbations. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 1765--1773."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_25_1","volume-title":"British Machine Vision Conference (BMVC). BMVA.","author":"Mopuri Konda Reddy","year":"2017","unstructured":"Konda Reddy Mopuri , Utsav Garg , and R Venkatesh Babu . 2017 . Fast Feature Fool: A Data Independent Approach to Universal Adversarial perturbations . In British Machine Vision Conference (BMVC). BMVA. Konda Reddy Mopuri, Utsav Garg, and R Venkatesh Babu. 2017. Fast Feature Fool: A Data Independent Approach to Universal Adversarial perturbations. In British Machine Vision Conference (BMVC). BMVA."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011139631724"},{"key":"e_1_3_2_1_27_1","volume-title":"Transferability in Machine Learning: from Phenomena to Black-box Attacks Using Adversarial Samples. arXiv preprint arXiv:1605.07277","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Patrick McDaniel , and Ian Goodfellow . 2016. Transferability in Machine Learning: from Phenomena to Black-box Attacks Using Adversarial Samples. arXiv preprint arXiv:1605.07277 ( 2016 ). Nicolas Papernot, Patrick McDaniel, and Ian Goodfellow. 2016. Transferability in Machine Learning: from Phenomena to Black-box Attacks Using Adversarial Samples. arXiv preprint arXiv:1605.07277 (2016)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_2_1_29_1","volume-title":"Object Retrieval with Large Vocabularies and Fast Spatial Matching. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE.","author":"Philbin James","year":"2007","unstructured":"James Philbin , Ondrej Chum , Michael Isard , Josef Sivic , and Andrew Zisserman . 2007 . Object Retrieval with Large Vocabularies and Fast Spatial Matching. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE. James Philbin, Ondrej Chum, Michael Isard, Josef Sivic, and Andrew Zisserman. 2007. Object Retrieval with Large Vocabularies and Fast Spatial Matching. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE."},{"key":"e_1_3_2_1_30_1","volume-title":"Lost in Quantization: Improving Particular Object Retrieval in Large Scale Image Databases. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR) . IEEE.","author":"Philbin James","year":"2008","unstructured":"James Philbin , Ondrej Chum , Michael Isard , Josef Sivic , and Andrew Zisserman . 2008 . Lost in Quantization: Improving Particular Object Retrieval in Large Scale Image Databases. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR) . IEEE. James Philbin, Ondrej Chum, Michael Isard, Josef Sivic, and Andrew Zisserman. 2008. Lost in Quantization: Improving Particular Object Retrieval in Large Scale Image Databases. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR) . IEEE."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/2197882.2199446"},{"key":"e_1_3_2_1_32_1","volume-title":"Fine-tuning CNN Image Retrieval with No Human Annotation","author":"Radenovi\u0107 Filip","year":"2018","unstructured":"Filip Radenovi\u0107 , Giorgos Tolias , and Ondrej Chum . 2018. Fine-tuning CNN Image Retrieval with No Human Annotation . IEEE Transactions on Pattern Analysis and Machine Intelligence ( 2018 ). Filip Radenovi\u0107, Giorgos Tolias, and Ondrej Chum. 2018. Fine-tuning CNN Image Retrieval with No Human Annotation. IEEE Transactions on Pattern Analysis and Machine Intelligence (2018)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299148"},{"key":"e_1_3_2_1_34_1","volume-title":"Online","author":"Security Rian Barrett","year":"2019","unstructured":"Rian Barrett Security . 2018. Facebook Exposed 6.8 Million users' Photos to Cap Off a Terrible 2018. https:\/\/www.wired.com\/story\/facebook-photo-api-bug-millions-users-exposed\/ , Online ; accessed 24- April - 2019 . Rian Barrett Security. 2018. Facebook Exposed 6.8 Million users' Photos to Cap Off a Terrible 2018. https:\/\/www.wired.com\/story\/facebook-photo-api-bug-millions-users-exposed\/, Online; accessed 24-April-2019."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2014.131"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/946247.946751"},{"key":"e_1_3_2_1_37_1","volume-title":"Intriguing Properties of Neural Networks. In International Conference on Learning Representations (ICLR) .","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . 2014 . Intriguing Properties of Neural Networks. In International Conference on Learning Representations (ICLR) . Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2014. Intriguing Properties of Neural Networks. In International Conference on Learning Representations (ICLR) ."},{"key":"e_1_3_2_1_38_1","volume-title":"Particular Object Retrieval with Integral Max-pooling of CNN Activations. In International Conference on Learning Representations (ICLR) .","author":"Tolias Giorgos","year":"2016","unstructured":"Giorgos Tolias , Ronan Sicre , and Herv\u00e9 J\u00e9gou . 2016 . Particular Object Retrieval with Integral Max-pooling of CNN Activations. In International Conference on Learning Representations (ICLR) . Giorgos Tolias, Ronan Sicre, and Herv\u00e9 J\u00e9gou. 2016. Particular Object Retrieval with Integral Max-pooling of CNN Activations. In International Conference on Learning Representations (ICLR) ."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"e_1_3_2_1_40_1","volume-title":"Mitigating Adversarial Effects Through Randomization. In International Conference on Learning Representations (ICLR) .","author":"Xie Cihang","year":"2018","unstructured":"Cihang Xie , Jianyu Wang , Zhishuai Zhang , Zhou Ren , and Alan Yuille . 2018 . Mitigating Adversarial Effects Through Randomization. In International Conference on Learning Representations (ICLR) . Cihang Xie, Jianyu Wang, Zhishuai Zhang, Zhou Ren, and Alan Yuille. 2018. Mitigating Adversarial Effects Through Randomization. In International Conference on Learning Representations (ICLR) ."}],"event":{"name":"ICMR '19: International Conference on Multimedia Retrieval","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Ottawa ON Canada","acronym":"ICMR '19"},"container-title":["Proceedings of the 2019 on International Conference on Multimedia Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323873.3325052","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3323873.3325052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:12Z","timestamp":1750204452000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323873.3325052"}},"subtitle":["The Impact of Image Modifications on Content-based Image Retrieval"],"short-title":[],"issued":{"date-parts":[[2019,6,5]]},"references-count":40,"alternative-id":["10.1145\/3323873.3325052","10.1145\/3323873"],"URL":"https:\/\/doi.org\/10.1145\/3323873.3325052","relation":{},"subject":[],"published":{"date-parts":[[2019,6,5]]},"assertion":[{"value":"2019-06-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}