{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:59:21Z","timestamp":1773511161632,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T00:00:00Z","timestamp":1597881600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Key R&D Program-The Key Industry Innovation Chain of Shaanxi","award":["2019ZDLGY03-02-01"],"award-info":[{"award-number":["2019ZDLGY03-02-01"]}]},{"name":"National Key R&D Program of China","award":["2017YFE0104100"],"award-info":[{"award-number":["2017YFE0104100"]}]},{"name":"National Key R&D Program of China","award":["2016YFE0200400"],"award-info":[{"award-number":["2016YFE0200400"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,23]]},"DOI":"10.1145\/3394486.3403084","type":"proceedings-article","created":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T23:17:27Z","timestamp":1597965447000},"page":"421-429","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Vulnerability vs. Reliability: Disentangled Adversarial Examples for Cross-Modal Learning"],"prefix":"10.1145","author":[{"given":"Chao","family":"Li","sequence":"first","affiliation":[{"name":"Xidian University, Xi'an, China"}]},{"given":"Haoteng","family":"Tang","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]},{"given":"Cheng","family":"Deng","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, China"}]},{"given":"Liang","family":"Zhan","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]},{"given":"Wei","family":"Liu","sequence":"additional","affiliation":[{"name":"Tencent AI Lab, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2020,8,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Tensorflow: A system for large-scale machine learning. In OSDI. 265--283.","author":"Abadi Mart'in","year":"2016","unstructured":"Mart'in Abadi , Paul Barham , Jianmin Chen , Zhifeng Chen , Andy Davis , Jeffrey Dean , Matthieu Devin , Sanjay Ghemawat , Geoffrey Irving , Michael Isard , 2016 . Tensorflow: A system for large-scale machine learning. In OSDI. 265--283. Mart'in Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, et al. 2016. Tensorflow: A system for large-scale machine learning. In OSDI. 265--283."},{"key":"e_1_3_2_1_2_1","volume-title":"Vqa: Visual question answering. In ICCV. 2425--2433.","author":"Antol Stanislaw","year":"2015","unstructured":"Stanislaw Antol , Aishwarya Agrawal , Jiasen Lu , Margaret Mitchell , Dhruv Batra , C Lawrence Zitnick , and Devi Parikh . 2015 . Vqa: Visual question answering. In ICCV. 2425--2433. Stanislaw Antol, Aishwarya Agrawal, Jiasen Lu, Margaret Mitchell, Dhruv Batra, C Lawrence Zitnick, and Devi Parikh. 2015. Vqa: Visual question answering. In ICCV. 2425--2433."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Juan C Caicedo and Svetlana Lazebnik. 2015. Active object localization with deep reinforcement learning. In CVPR. 2488--2496.  Juan C Caicedo and Svetlana Lazebnik. 2015. Active object localization with deep reinforcement learning. In CVPR. 2488--2496.","DOI":"10.1109\/ICCV.2015.286"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Yue Cao Bin Liu Mingsheng Long and Jianmin Wang. 2018. Cross-Modal Hamming Hashing. In ECCV. 207--223.  Yue Cao Bin Liu Mingsheng Long and Jianmin Wang. 2018. Cross-Modal Hamming Hashing. In ECCV. 207--223.","DOI":"10.1007\/978-3-030-01246-5_13"},{"key":"e_1_3_2_1_5_1","volume-title":"Yu","author":"Cao Yue","year":"2016","unstructured":"Yue Cao , Mingsheng Long , Jianmin Wang , Qiang Yang , and Philip S . Yu . 2016 . Deep Visual-Semantic Hashing for Cross-Modal Retrieval. In KDD. 1445--1454. Yue Cao, Mingsheng Long, Jianmin Wang, Qiang Yang, and Philip S. Yu. 2016. Deep Visual-Semantic Hashing for Cross-Modal Retrieval. In KDD. 1445--1454."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In SP. 39--57.  Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In SP. 39--57.","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_7_1","volume-title":"Attacking Visual Language Grounding with Adversarial Examples: A Case Study on Neural Image Captioning. arXiv preprint arXiv:1712.02051","author":"Chen Hongge","year":"2017","unstructured":"Hongge Chen , Huan Zhang , Pin-Yu Chen , Jinfeng Yi , and Cho-Jui Hsieh . 2017. Attacking Visual Language Grounding with Adversarial Examples: A Case Study on Neural Image Captioning. arXiv preprint arXiv:1712.02051 ( 2017 ). Hongge Chen, Huan Zhang, Pin-Yu Chen, Jinfeng Yi, and Cho-Jui Hsieh. 2017. Attacking Visual Language Grounding with Adversarial Examples: A Case Study on Neural Image Captioning. arXiv preprint arXiv:1712.02051 (2017)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Zerui Chen Yan Huang and Liang Wang. 2019. Augmented Visual-Semantic Embeddings for Image and Sentence Matching. In ICIP. 290--294.  Zerui Chen Yan Huang and Liang Wang. 2019. Augmented Visual-Semantic Embeddings for Image and Sentence Matching. In ICIP. 290--294.","DOI":"10.1109\/ICIP.2019.8802975"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Tat-Seng Chua Jinhui Tang Richang Hong Haojie Li Zhiping Luo and Yantao Zheng. 2009. NUS-WIDE: a real-world web image database from National University of Singapore. In CIVR. 48.  Tat-Seng Chua Jinhui Tang Richang Hong Haojie Li Zhiping Luo and Yantao Zheng. 2009. NUS-WIDE: a real-world web image database from National University of Singapore. In CIVR. 48.","DOI":"10.1145\/1646396.1646452"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2821921"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2903661"},{"key":"e_1_3_2_1_12_1","volume-title":"2019 a. Two-stream deep hashing with class-specific centers for supervised image search","author":"Deng Cheng","year":"2019","unstructured":"Cheng Deng , Erkun Yang , Tongliang Liu , and Dacheng Tao . 2019 a. Two-stream deep hashing with class-specific centers for supervised image search . IEEE Transactions on Neural Networks and Learning Systems ( 2019 ). Cheng Deng, Erkun Yang, Tongliang Liu, and Dacheng Tao. 2019 a. Two-stream deep hashing with class-specific centers for supervised image search. IEEE Transactions on Neural Networks and Learning Systems (2019)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Yinpeng Dong Fangzhou Liao Tianyu Pang Hang Su Jun Zhu Xiaolin Hu and Jianguo Li. 2018. Boosting adversarial attacks with momentum. In CVPR. 9185--9193.  Yinpeng Dong Fangzhou Liao Tianyu Pang Hang Su Jun Zhu Xiaolin Hu and Jianguo Li. 2018. Boosting adversarial attacks with momentum. In CVPR. 9185--9193.","DOI":"10.1109\/CVPR.2018.00957"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Vijetha Gattupalli Yaoxin Zhuo and Baoxin Li. 2019. Weakly Supervised Deep Image Hashing through Tag Embeddings. In CVPR. 10375--10384.  Vijetha Gattupalli Yaoxin Zhuo and Baoxin Li. 2019. Weakly Supervised Deep Image Hashing through Tag Embeddings. In CVPR. 10375--10384.","DOI":"10.1109\/CVPR.2019.01062"},{"key":"e_1_3_2_1_15_1","unstructured":"Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In NeurIPS. 2672--2680.  Ian Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron Courville and Yoshua Bengio. 2014. Generative adversarial nets. In NeurIPS. 2672--2680."},{"key":"e_1_3_2_1_16_1","unstructured":"Ian J Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and harnessing adversarial examples. In ICLR.  Ian J Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and harnessing adversarial examples. In ICLR."},{"key":"e_1_3_2_1_17_1","unstructured":"Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2016. Deep residual learning for image recognition. In CVPR. 770--778.  Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2016. Deep residual learning for image recognition. In CVPR. 770--778."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Mark J Huiskes and Michael S Lew. 2008. The MIR flickr retrieval evaluation. In MIPR. 39--43.  Mark J Huiskes and Michael S Lew. 2008. The MIR flickr retrieval evaluation. In MIPR. 39--43.","DOI":"10.1145\/1460096.1460104"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Qing-Yuan Jiang and Wu-Jun Li. 2017. Deep cross-modal hashing. In CVPR. 3232--3240.  Qing-Yuan Jiang and Wu-Jun Li. 2017. Deep cross-modal hashing. In CVPR. 3232--3240.","DOI":"10.1109\/CVPR.2017.348"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2897944"},{"key":"e_1_3_2_1_21_1","unstructured":"Andrej Karpathy Armand Joulin and Li F Fei-Fei. 2014. Deep fragment embeddings for bidirectional image sentence mapping. In NeurIPS. 1889--1897.  Andrej Karpathy Armand Joulin and Li F Fei-Fei. 2014. Deep fragment embeddings for bidirectional image sentence mapping. In NeurIPS. 1889--1897."},{"key":"e_1_3_2_1_22_1","volume-title":"ICLR workshop.","author":"Kurakin Alexey","year":"2017","unstructured":"Alexey Kurakin , Ian Goodfellow , and Samy Bengio . 2017 . Adversarial examples in the physical world . In ICLR workshop. Alexey Kurakin, Ian Goodfellow, and Samy Bengio. 2017. Adversarial examples in the physical world. In ICLR workshop."},{"key":"e_1_3_2_1_23_1","unstructured":"Chao Li Cheng Deng Shangqian Gao De Xie and Wei Liu. 2019. Cross-Modal Learning with Adversarial Samples. In NeurIPS. 10791--10801.  Chao Li Cheng Deng Shangqian Gao De Xie and Wei Liu. 2019. Cross-Modal Learning with Adversarial Samples. In NeurIPS. 10791--10801."},{"key":"e_1_3_2_1_24_1","unstructured":"Chao Li Cheng Deng Ning Li Wei Liu Xinbo Gao and Dacheng Tao. 2018a. Self-Supervised Adversarial Hashing Networks for Cross-Modal Retrieval. In CVPR. 4242--4251.  Chao Li Cheng Deng Ning Li Wei Liu Xinbo Gao and Dacheng Tao. 2018a. Self-Supervised Adversarial Hashing Networks for Cross-Modal Retrieval. In CVPR. 4242--4251."},{"key":"e_1_3_2_1_25_1","unstructured":"Maosen Li Cheng Deng Tengjiao Li Junchi Yan Xinbo Gao and Heng Huang. 2020. Towards Transferable Targeted Attack. In CVPR. 641--649.  Maosen Li Cheng Deng Tengjiao Li Junchi Yan Xinbo Gao and Heng Huang. 2020. Towards Transferable Targeted Attack. In CVPR. 641--649."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2710186"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Zijia Lin Guiguang Ding Mingqing Hu and Jianmin Wang. 2015. Semantics-Preserving Hashing for Cross-View Retrieval. In CVPR.  Zijia Lin Guiguang Ding Mingqing Hu and Jianmin Wang. 2015. Semantics-Preserving Hashing for Cross-View Retrieval. In CVPR.","DOI":"10.1109\/CVPR.2015.7299011"},{"key":"e_1_3_2_1_28_1","unstructured":"Wei Liu Cun Mu Sanjiv Kumar and Shih-Fu Chang. 2014. Discrete graph hashing. In NIPS. 3419--3427.  Wei Liu Cun Mu Sanjiv Kumar and Shih-Fu Chang. 2014. Discrete graph hashing. In NIPS. 3419--3427."},{"key":"e_1_3_2_1_29_1","volume-title":"CVPR. IEEE","author":"Liu Wei","year":"2012","unstructured":"Wei Liu , Jun Wang , Rongrong Ji , Yu-Gang Jiang , and Shih-Fu Chang . 2012 a. Supervised hashing with kernels . In CVPR. IEEE , 2074--2081. Wei Liu, Jun Wang, Rongrong Ji, Yu-Gang Jiang, and Shih-Fu Chang. 2012a. Supervised hashing with kernels. In CVPR. IEEE, 2074--2081."},{"key":"e_1_3_2_1_30_1","unstructured":"Wei Liu Jun Wang Sanjiv Kumar and Shih-Fu Chang. 2011. Hashing with graphs. In ICML. 1--8.  Wei Liu Jun Wang Sanjiv Kumar and Shih-Fu Chang. 2011. Hashing with graphs. In ICML. 1--8."},{"key":"e_1_3_2_1_31_1","unstructured":"Wei Liu Jun Wang Yadong Mu Sanjiv Kumar and Shih-Fu Chang. 2012b. Compact hyperplane hashing with bilinear functions. In ICML. 467--474.  Wei Liu Jun Wang Yadong Mu Sanjiv Kumar and Shih-Fu Chang. 2012b. Compact hyperplane hashing with bilinear functions. In ICML. 467--474."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2016.39"},{"key":"e_1_3_2_1_33_1","unstructured":"Xuanwu Liu Guoxian Yu Carlotta Domeniconi Jun Wang Yazhou Ren and Maozu Guo. 2019. Ranking-based Deep Cross-modal Hashing. In AAAI.  Xuanwu Liu Guoxian Yu Carlotta Domeniconi Jun Wang Yazhou Ren and Maozu Guo. 2019. Ranking-based Deep Cross-modal Hashing. In AAAI."},{"key":"e_1_3_2_1_34_1","volume-title":"Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083","author":"Madry Aleksander","year":"2017","unstructured":"Aleksander Madry , Aleksandar Makelov , Ludwig Schmidt , Dimitris Tsipras , and Adrian Vladu . 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 ( 2017 ). Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)."},{"key":"e_1_3_2_1_35_1","unstructured":"Junhua Mao Wei Xu Yi Yang Jiang Wang Zhiheng Huang and Alan Yuille. 2015. Deep captioning with multimodal recurrent neural networks (m-rnn). In ICLR.  Junhua Mao Wei Xu Yi Yang Jiang Wang Zhiheng Huang and Alan Yuille. 2015. Deep captioning with multimodal recurrent neural networks (m-rnn). In ICLR."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Seyed-Mohsen Moosavi-Dezfooli Alhussein Fawzi Omar Fawzi and Pascal Frossard. 2017. Universal adversarial perturbations. In CVPR. 1765--1773.  Seyed-Mohsen Moosavi-Dezfooli Alhussein Fawzi Omar Fawzi and Pascal Frossard. 2017. Universal adversarial perturbations. In CVPR. 1765--1773.","DOI":"10.1109\/CVPR.2017.17"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Seyed-Mohsen Moosavi-Dezfooli Alhussein Fawzi and Pascal Frossard. 2016. Deepfool: a simple and accurate method to fool deep neural networks. In CVPR. 2574--2582.  Seyed-Mohsen Moosavi-Dezfooli Alhussein Fawzi and Pascal Frossard. 2016. Deepfool: a simple and accurate method to fool deep neural networks. In CVPR. 2574--2582.","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Anh Nguyen Jason Yosinski and Jeff Clune. 2015. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images. In CVPR. 427--436.  Anh Nguyen Jason Yosinski and Jeff Clune. 2015. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images. In CVPR. 427--436.","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"e_1_3_2_1_39_1","unstructured":"Vicente Ordonez Girish Kulkarni and Tamara L Berg. 2011. Im2text: Describing images using 1 million captioned photographs. In NeurIPS. 1143--1151.  Vicente Ordonez Girish Kulkarni and Tamara L Berg. 2011. Im2text: Describing images using 1 million captioned photographs. In NeurIPS. 1143--1151."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.142"},{"key":"e_1_3_2_1_41_1","unstructured":"Scott Reed Zeynep Akata Xinchen Yan Lajanugen Logeswaran Bernt Schiele and Honglak Lee. 2016. Generative adversarial text to image synthesis. In ICML. 1060--1069.  Scott Reed Zeynep Akata Xinchen Yan Lajanugen Logeswaran Bernt Schiele and Honglak Lee. 2016. Generative adversarial text to image synthesis. In ICML. 1060--1069."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Fumin Shen Chunhua Shen Wei Liu and Heng Tao Shen. 2015. Supervised discrete hashing. In CVPR. 37--45.  Fumin Shen Chunhua Shen Wei Liu and Heng Tao Shen. 2015. Supervised discrete hashing. In CVPR. 37--45.","DOI":"10.1109\/CVPR.2015.7298598"},{"key":"e_1_3_2_1_43_1","unstructured":"Chao Zhang Shupeng Su Zhisheng Zhong. 2019. Deep Joint-Semantics Reconstructing Hashing for Large-Scale Unsupervised Cross-Modal Retrieval. In ICCV.  Chao Zhang Shupeng Su Zhisheng Zhong. 2019. Deep Joint-Semantics Reconstructing Hashing for Large-Scale Unsupervised Cross-Modal Retrieval. In ICCV."},{"key":"e_1_3_2_1_44_1","unstructured":"Karen Simonyan and Andrew Zisserman. 2015. Very deep convolutional networks for large-scale image recognition. In ICLR.  Karen Simonyan and Andrew Zisserman. 2015. Very deep convolutional networks for large-scale image recognition. In ICLR."},{"key":"e_1_3_2_1_45_1","volume-title":"Danilo Vasconcellos Vargas, and Kouichi Sakurai","author":"Su Jiawei","year":"2019","unstructured":"Jiawei Su , Danilo Vasconcellos Vargas, and Kouichi Sakurai . 2019 . One pixel attack for fooling deep neural networks. IEEE Transactions on Evolutionary Computation ( 2019). Jiawei Su, Danilo Vasconcellos Vargas, and Kouichi Sakurai. 2019. One pixel attack for fooling deep neural networks. IEEE Transactions on Evolutionary Computation (2019)."},{"key":"e_1_3_2_1_46_1","unstructured":"Mengying Sun Fengyi Tang Jinfeng Yi Fei Wang and Jiayu Zhou. 2018. Identify susceptible locations in medical records via adversarial attacks on deep predictive models. In ACM SIGKDD. ACM 793--801.  Mengying Sun Fengyi Tang Jinfeng Yi Fei Wang and Jiayu Zhou. 2018. Identify susceptible locations in medical records via adversarial attacks on deep predictive models. In ACM SIGKDD. ACM 793--801."},{"key":"e_1_3_2_1_47_1","volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 ( 2013 ). Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Bokun Wang Yang Yang Xing Xu Alan Hanjalic and Heng Tao Shen. 2017. Adversarial cross-modal retrieval. In ACM MM. 154--162.  Bokun Wang Yang Yang Xing Xu Alan Hanjalic and Heng Tao Shen. 2017. Adversarial cross-modal retrieval. In ACM MM. 154--162.","DOI":"10.1145\/3123266.3123326"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.2963957"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Peixi Xiong Huayi Zhan Xin Wang Baivab Sinha and Ying Wu. 2019. Visual Query Answering by Entity-Attribute Graph Matching and Reasoning. In CVPR. 8357--8366.  Peixi Xiong Huayi Zhan Xin Wang Baivab Sinha and Ying Wu. 2019. Visual Query Answering by Entity-Attribute Graph Matching and Reasoning. In CVPR. 8357--8366.","DOI":"10.1109\/CVPR.2019.00855"},{"key":"e_1_3_2_1_51_1","volume-title":"Attngan: Fine-grained text to image generation with attentional generative adversarial networks. In CVPR. 1316--1324.","author":"Xu Tao","year":"2018","unstructured":"Tao Xu , Pengchuan Zhang , Qiuyuan Huang , Han Zhang , Zhe Gan , Xiaolei Huang , and Xiaodong He . 2018 b. Attngan: Fine-grained text to image generation with attentional generative adversarial networks. In CVPR. 1316--1324. Tao Xu, Pengchuan Zhang, Qiuyuan Huang, Han Zhang, Zhe Gan, Xiaolei Huang, and Xiaodong He. 2018b. Attngan: Fine-grained text to image generation with attentional generative adversarial networks. In CVPR. 1316--1324."},{"key":"e_1_3_2_1_52_1","volume-title":"Can you fool AI with adversarial examples on a visual turing test. arXiv preprint arXiv:1709.08693","author":"Xu Xiaojun","year":"2017","unstructured":"Xiaojun Xu , Xinyun Chen , Chang Liu , Anna Rohrbach , Trevor Darell , and Dawn Song . 2017. Can you fool AI with adversarial examples on a visual turing test. arXiv preprint arXiv:1709.08693 ( 2017 ). Xiaojun Xu, Xinyun Chen, Chang Liu, Anna Rohrbach, Trevor Darell, and Dawn Song. 2017. Can you fool AI with adversarial examples on a visual turing test. arXiv preprint arXiv:1709.08693 (2017)."},{"key":"e_1_3_2_1_53_1","unstructured":"Xiaojun Xu Xinyun Chen Chang Liu Anna Rohrbach Trevor Darrell and Dawn Song. 2018a. Fooling Vision and Language Models Despite Localization and Attention Mechanism. In CVPR. 4951--4961.  Xiaojun Xu Xinyun Chen Chang Liu Anna Rohrbach Trevor Darrell and Dawn Song. 2018a. Fooling Vision and Language Models Despite Localization and Attention Mechanism. In CVPR. 4951--4961."},{"key":"e_1_3_2_1_54_1","volume-title":"Heng Tao Shen, and Wei Liu","author":"Xu Yan","year":"2019","unstructured":"Yan Xu , Baoyuan Wu , Fumin Shen , Yanbo Fan , Yong Zhang , Heng Tao Shen, and Wei Liu . 2019 . Exact Adversarial Attack to Image Captioning via Structured Output Learning with Latent Variables. In CVPR. 4135--4144. Yan Xu, Baoyuan Wu, Fumin Shen, Yanbo Fan, Yong Zhang, Heng Tao Shen, and Wei Liu. 2019. Exact Adversarial Attack to Image Captioning via Structured Output Learning with Latent Variables. In CVPR. 4135--4144."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2793863"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Erkun Yang Cheng Deng Wei Liu Xianglong Liu Dacheng Tao and Xinbo Gao. 2017. Pairwise relationship guided deep hashing for cross-modal retrieval. In AAAI.  Erkun Yang Cheng Deng Wei Liu Xianglong Liu Dacheng Tao and Xinbo Gao. 2017. Pairwise relationship guided deep hashing for cross-modal retrieval. In AAAI.","DOI":"10.1609\/aaai.v31i1.10719"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Erkun Yang Tongliang Liu Cheng Deng Wei Liu and Dacheng Tao. 2019. DistillHash: Unsupervised Deep Hashing by Distilling Data Pairs. In CVPR. 2946--2955.  Erkun Yang Tongliang Liu Cheng Deng Wei Liu and Dacheng Tao. 2019. DistillHash: Unsupervised Deep Hashing by Distilling Data Pairs. In CVPR. 2946--2955.","DOI":"10.1109\/CVPR.2019.00306"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"crossref","unstructured":"Xi Zhang Hanjiang Lai and Jiashi Feng. 2018. Attention-Aware Deep Adversarial Hashing for Cross-Modal Retrieval. In ECCV. 591--606.  Xi Zhang Hanjiang Lai and Jiashi Feng. 2018. Attention-Aware Deep Adversarial Hashing for Cross-Modal Retrieval. In ECCV. 591--606.","DOI":"10.1007\/978-3-030-01267-0_36"}],"event":{"name":"KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Virtual Event CA USA","acronym":"KDD '20","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394486.3403084","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3394486.3403084","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:38Z","timestamp":1750200098000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394486.3403084"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,20]]},"references-count":58,"alternative-id":["10.1145\/3394486.3403084","10.1145\/3394486"],"URL":"https:\/\/doi.org\/10.1145\/3394486.3403084","relation":{},"subject":[],"published":{"date-parts":[[2020,8,20]]},"assertion":[{"value":"2020-08-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}