{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:41:14Z","timestamp":1776886874677,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,11]],"date-time":"2021-07-11T00:00:00Z","timestamp":1625961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Australian Research Council Discovery Project","award":["CE200100025"],"award-info":[{"award-number":["CE200100025"]}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005244","name":"Australian Research Council Discovery Project","doi-asserted-by":"publisher","award":["DP190102353"],"award-info":[{"award-number":["DP190102353"]}],"id":[{"id":"10.13039\/100005244","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,11]]},"DOI":"10.1145\/3404835.3462837","type":"proceedings-article","created":{"date-parts":[[2021,7,12]],"date-time":"2021-07-12T02:41:52Z","timestamp":1626057712000},"page":"634-643","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Privacy Protection in Deep Multi-modal Retrieval"],"prefix":"10.1145","author":[{"given":"Peng-Fei","family":"Zhang","sequence":"first","affiliation":[{"name":"The University of Queensland, Brisbane, Australia"}]},{"given":"Yang","family":"Li","sequence":"additional","affiliation":[{"name":"The University of Queensland, Brisbane, Australia"}]},{"given":"Zi","family":"Huang","sequence":"additional","affiliation":[{"name":"The University of Queensland, Brisbane, Australia"}]},{"given":"Hongzhi","family":"Yin","sequence":"additional","affiliation":[{"name":"The University of Queensland, Brisbane, Australia"}]}],"member":"320","published-online":{"date-parts":[[2021,7,11]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526","author":"Chen Xinyun","year":"2017","unstructured":"Xinyun Chen, Chang Liu, Bo Li, Kimberly Lu, and Dawn Song. 2017. Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526 (2017)."},{"key":"e_1_3_2_2_2_1","volume-title":"LowKey: leveraging adversarial attacks to protect social media users from facial recognition. arXiv preprint arXiv:2101.07922","author":"Cherepanova Valeriia","year":"2021","unstructured":"Valeriia Cherepanova, Micah Goldblum, Harrison Foley, Shiyuan Duan, John Dickerson, Gavin Taylor, and Tom Goldstein. 2021. LowKey: leveraging adversarial attacks to protect social media users from facial recognition. arXiv preprint arXiv:2101.07922 (2021)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Tat-Seng Chua Jinhui Tang Richang Hong Haojie Li Zhiping Luo and Yantao Zheng. 2009. NUS-WIDE: a real-world web image database from national university of singapore. In MIR. 1--9.","DOI":"10.1145\/1646396.1646452"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Guiguang Ding Yuchen Guo and Jile Zhou. 2014. Collective matrix factorization hashing for multimodal data. In CVPR. 2075--2082.","DOI":"10.1109\/CVPR.2014.267"},{"key":"e_1_3_2_2_5_1","unstructured":"Yaroslav Ganin and Victor Lempitsky. 2015. Unsupervised domain adaptation by backpropagation. In ICML. 1180--1189."},{"key":"e_1_3_2_2_6_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2890144"},{"key":"e_1_3_2_2_8_1","unstructured":"Peng Hu Liangli Zhen Dezhong Peng and Pei Liu. 2019. Scalable deep multimodal learning for cross-modal retrieval. In SIGIR. 635--644."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Mark J Huiskes and Michael S Lew. 2008. The MIR flickr retrieval evaluation. In MIR. 39--43.","DOI":"10.1145\/1460096.1460104"},{"key":"e_1_3_2_2_10_1","unstructured":"Andrew Ilyas Shibani Santurkar Dimitris Tsipras Logan Engstrom Brandon Tran and Aleksander Madry. 2019. Adversarial examples are not bugs they are features. In NeurIPS. 125--136."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Qing-Yuan Jiang and Wu-Jun Li. 2017. Deep cross-modal hashing. In CVPR. 3270--3278.","DOI":"10.1109\/CVPR.2017.348"},{"key":"e_1_3_2_2_12_1","unstructured":"Pang Wei Koh and Percy Liang. 2017. Understanding black-box predictions via influence functions. In ICML. 1885--1894."},{"key":"e_1_3_2_2_13_1","unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In NeurIPS. 1097--1105."},{"key":"e_1_3_2_2_14_1","unstructured":"Shaishav Kumar and Raghavendra Udupa. 2011. Learning hash functions for cross-view similarity search. In IJCAI. 1360--1365."},{"key":"e_1_3_2_2_15_1","volume-title":"Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236","author":"Kurakin Alexey","year":"2016","unstructured":"Alexey Kurakin, Ian Goodfellow, and Samy Bengio. 2016. Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236 (2016)."},{"key":"e_1_3_2_2_16_1","unstructured":"Bo Li Yining Wang Aarti Singh and Yevgeniy Vorobeychik. 2016. Data poisoning attacks on factorization-based collaborative filtering. In NeurIPS. 1885--1893."},{"key":"e_1_3_2_2_17_1","unstructured":"Chao Li Shangqian Gao Cheng Deng De Xie and Wei Liu. 2019. Cross-modal learning with adversarial samples. In NeurIPS. 10792--10802."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Song Liu Shengsheng Qian Yang Guan Jiawei Zhan and Long Ying. 2020. Joint-modal distribution-based similarity hashing for large-scale unsupervised deep cross-modal retrieval. In SIGIR. 1379--1388.","DOI":"10.1145\/3397271.3401086"},{"key":"e_1_3_2_2_19_1","unstructured":"Mingsheng Long Yue Cao Jianmin Wang and Philip S Yu. 2016. Composite correlation quantization for efficient multimodal retrieval. In SIGIR. 579--588."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Xin Luo Ye Wu and Xin-Shun Xu. 2018a. Scalable supervised discrete hashing for large-scale search. In WWW. 1603--1612.","DOI":"10.1145\/3178876.3186072"},{"key":"e_1_3_2_2_21_1","first-page":"128","article-title":"Robust discrete code modeling for supervised hashing","volume":"75","author":"Luo Yadan","year":"2018","unstructured":"Yadan Luo, Yang Yang, Fumin Shen, Zi Huang, Pan Zhou, and Heng Tao Shen. 2018b. Robust discrete code modeling for supervised hashing. PR, Vol. 75 (2018), 128--135.","journal-title":"PR"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Shike Mei and Xiaojin Zhu. 2015. Using machine teaching to identify optimal training-set attacks on machine learners. In AAAI. 2871--2877.","DOI":"10.1609\/aaai.v29i1.9569"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Seyed-Mohsen Moosavi-Dezfooli Alhussein Fawzi Omar Fawzi and Pascal Frossard. 2017. Universal adversarial perturbations. In CVPR. 1765--1773.","DOI":"10.1109\/CVPR.2017.17"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Seyed-Mohsen Moosavi-Dezfooli Alhussein Fawzi and Pascal Frossard. 2016. Deepfool: a simple and accurate method to fool deep neural networks. In CVPR. 2574--2582.","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_2_25_1","volume-title":"Fast feature fool: a data independent approach to universal adversarial perturbations. arXiv preprint arXiv:1707.05572","author":"Mopuri Konda Reddy","year":"2017","unstructured":"Konda Reddy Mopuri, Utsav Garg, and R Venkatesh Babu. 2017. Fast feature fool: a data independent approach to universal adversarial perturbations. arXiv preprint arXiv:1707.05572 (2017)."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Luis Mu noz-Gonz\u00e1lez Battista Biggio Ambra Demontis Andrea Paudice Vasin Wongrassamee Emil C Lupu and Fabio Roli. 2017. Towards poisoning of deep learning algorithms with back-gradient optimization. In AISec. 27--38.","DOI":"10.1145\/3128572.3140451"},{"key":"e_1_3_2_2_27_1","volume-title":"Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. arXiv preprint arXiv:1605.07277","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot, Patrick McDaniel, and Ian Goodfellow. 2016. Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. arXiv preprint arXiv:1605.07277 (2016)."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","unstructured":"Omid Poursaeed Isay Katsman Bicheng Gao and Serge Belongie. 2018. Generative adversarial perturbations. In CVPR. 4422--4431.","DOI":"10.1109\/CVPR.2018.00465"},{"key":"e_1_3_2_2_29_1","first-page":"45","article-title":"A general framework for parallel distributed processing","volume":"1","author":"Rumelhart David E","year":"1986","unstructured":"David E Rumelhart, Geoffrey E Hinton, James L McClelland, et al. 1986. A general framework for parallel distributed processing. PDP, Vol. 1, 26 (1986), 45--76.","journal-title":"PDP"},{"key":"e_1_3_2_2_30_1","unstructured":"Ali Shafahi W Ronny Huang Mahyar Najibi Octavian Suciu Christoph Studer Tudor Dumitras and Tom Goldstein. 2018. Poison frogs! targeted clean-label poisoning attacks on neural networks. In NeurIPS. 6103--6113."},{"key":"e_1_3_2_2_31_1","unstructured":"Shawn Shan Emily Wenger Jiayun Zhang Huiying Li Haitao Zheng and Ben Y Zhao. 2020. Fawkes: protecting privacy against unauthorized deep learning models. In Security. 1589--1604."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2789887"},{"key":"e_1_3_2_2_33_1","volume-title":"Exploiting subspace relation in semantic labels for cross-modal hashing. TKDE","author":"Shen Heng Tao","year":"2020","unstructured":"Heng Tao Shen, Luchen Liu, Yang Yang, Xing Xu, Zi Huang, Fumin Shen, and Richang Hong. 2020. Exploiting subspace relation in semantic labels for cross-modal hashing. TKDE (2020)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"Jingkuan Song Yang Yang Yi Yang Zi Huang and Heng Tao Shen. 2013. Inter-media hashing for large-scale retrieval from heterogeneous data sources. In SIGKDD. 785--796.","DOI":"10.1145\/2463676.2465274"},{"key":"e_1_3_2_2_35_1","unstructured":"Shupeng Su Zhisheng Zhong and Chao Zhang. 2019. Deep joint-semantics reconstructing hashing for large-scale unsupervised cross-modal retrieval. In CVPR. 3027--3035."},{"key":"e_1_3_2_2_36_1","volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)."},{"key":"e_1_3_2_2_37_1","volume-title":"The space of transferable adversarial examples. arXiv preprint arXiv:1704.03453","author":"Tram\u00e8r Florian","year":"2017","unstructured":"Florian Tram\u00e8r, Nicolas Papernot, Ian Goodfellow, Dan Boneh, and Patrick McDaniel. 2017. The space of transferable adversarial examples. arXiv preprint arXiv:1704.03453 (2017)."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Bokun Wang Yang Yang Xing Xu Alan Hanjalic and Heng Tao Shen. 2017. Adversarial cross-modal retrieval. In ACM MM. 154--162.","DOI":"10.1145\/3123266.3123326"},{"key":"e_1_3_2_2_39_1","volume-title":"Deep collaborative discrete hashing with semantic-invariant structure construction. TMM","author":"Wang Zijian","year":"2020","unstructured":"Zijian Wang, Zheng Zhang, Yadan Luo, Zi Huang, and Heng Tao Shen. 2020. Deep collaborative discrete hashing with semantic-invariant structure construction. TMM (2020)."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"crossref","unstructured":"Gengshen Wu Zijia Lin Jungong Han Li Liu Guiguang Ding Baochang Zhang and Jialie Shen. 2018. Unsupervised deep hashing via binary latent factor models for large-scale cross-modal retrieval. In IJCAI. 2854--2860.","DOI":"10.24963\/ijcai.2018\/396"},{"key":"e_1_3_2_2_41_1","unstructured":"Huang Xiao Battista Biggio Gavin Brown Giorgio Fumera Claudia Eckert and Fabio Roli. 2015. Is feature selection secure against training data poisoning?. In ICML. 1689--1698."},{"key":"e_1_3_2_2_42_1","unstructured":"Ruiqing Xu Chao Li Junchi Yan Cheng Deng and Xianglong Liu. 2019. Graph convolutional network hashing for cross-modal retrieval. In IJCAI. 10--16."},{"key":"e_1_3_2_2_43_1","unstructured":"Xing Xu Kaiyi Lin Huimin Lu Lianli Gao and Heng Tao Shen. 2020. Correlated features synthesis and alignment for zero-shot cross-modal retrieval. In SIGIR. 1419--1428."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2676345"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"Erkun Yang Cheng Deng Wei Liu Xianglong Liu Dacheng Tao and Xinbo Gao. 2017. Pairwise relationship guided deep hashing for cross-modal retrieval. In AAAI. 1618--1625.","DOI":"10.1609\/aaai.v31i1.10719"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"crossref","unstructured":"Yu-Wei Zhan Xin Luo Yongxin Wang and Xin-Shun Xu. 2020. Supervised hierarchical deep hashing for cross-modal retrieval. In ACM MM. 3386--3394.","DOI":"10.1145\/3394171.3413962"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"Dongqing Zhang and Wu-Jun Li. 2014. Large-scale supervised multimodal hashing with semantic correlation maximization. In AAAI. 7--13.","DOI":"10.1609\/aaai.v28i1.8995"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"crossref","unstructured":"Dell Zhang Jun Wang Deng Cai and Jinsong Lu. 2010. Self-taught hashing for fast similarity search. In SIGIR. 18--25.","DOI":"10.1145\/1835449.1835455"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"Peichao Zhang Wei Zhang Wu-Jun Li and Minyi Guo. 2014. Supervised hashing with latent factor models. In SIGIR. 173--182.","DOI":"10.1145\/2600428.2609600"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-020-00859-y"},{"key":"e_1_3_2_2_51_1","volume-title":"Heng Tao Shen, and Guangming Lu","author":"Zhang Zheng","year":"2020","unstructured":"Zheng Zhang, Luyao Liu, Yadan Luo, Zi Huang, Fumin Shen, Heng Tao Shen, and Guangming Lu. 2020. Inductive structure consistent hashing via flexible semantic calibration. TNNLS (2020)."},{"key":"e_1_3_2_2_52_1","unstructured":"Yi Zhen and Dit-Yan Yeung. 2012. Co-regularized hashing for multimodal data. In NeurIPS. 1376--1384."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"crossref","unstructured":"Jile Zhou Guiguang Ding and Yuchen Guo. 2014. Latent semantic sparse hashing for cross-modal similarity search. In SIGIR. 415--424.","DOI":"10.1145\/2600428.2609610"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2729025"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2457465.2457469"},{"key":"e_1_3_2_2_56_1","volume-title":"Heng Tao Shen, and Xin Zhao","author":"Zhu Xiaofeng","year":"2013","unstructured":"Xiaofeng Zhu, Zi Huang, Heng Tao Shen, and Xin Zhao. 2013b. Linear cross-modal hashing for efficient multimedia search. In ACM MM. 143--152."}],"event":{"name":"SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval","location":"Virtual Event Canada","acronym":"SIGIR '21","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404835.3462837","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3404835.3462837","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:17Z","timestamp":1750193237000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404835.3462837"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,11]]},"references-count":56,"alternative-id":["10.1145\/3404835.3462837","10.1145\/3404835"],"URL":"https:\/\/doi.org\/10.1145\/3404835.3462837","relation":{},"subject":[],"published":{"date-parts":[[2021,7,11]]},"assertion":[{"value":"2021-07-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}