{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T03:53:36Z","timestamp":1769918016489,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,11]],"date-time":"2021-07-11T00:00:00Z","timestamp":1625961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Dongguan Social Science and Technology Development Key Project","award":["2020507140146"],"award-info":[{"award-number":["2020507140146"]}]},{"name":"Guangdong Basic and Applied Basic Research Foundation","award":["2020B1515120028"],"award-info":[{"award-number":["2020B1515120028"]}]},{"DOI":"10.13039\/501100014601","name":"Dongguan University of Technology","doi-asserted-by":"publisher","award":["KCYKYQD2017003"],"award-info":[{"award-number":["KCYKYQD2017003"]}],"id":[{"id":"10.13039\/501100014601","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of China","award":["61876038"],"award-info":[{"award-number":["61876038"]}]},{"name":"Guangdong Peral River Recruitment Program of Talents","award":["2019ZT08X603"],"award-info":[{"award-number":["2019ZT08X603"]}]},{"name":"ARC Discovery Project","award":["180103411 and 220101762"],"award-info":[{"award-number":["180103411 and 220101762"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,11]]},"DOI":"10.1145\/3404835.3462887","type":"proceedings-article","created":{"date-parts":[[2021,7,12]],"date-time":"2021-07-12T02:41:48Z","timestamp":1626057708000},"page":"1064-1073","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["DAIR: A Query-Efficient Decision-based Attack on Image Retrieval Systems"],"prefix":"10.1145","author":[{"given":"Mingyang","family":"Chen","sequence":"first","affiliation":[{"name":"University of New South Wales, Sydney, Australia"}]},{"given":"Junda","family":"Lu","sequence":"additional","affiliation":[{"name":"University of New South Wales, Sydney, Australia"}]},{"given":"Yi","family":"Wang","sequence":"additional","affiliation":[{"name":"Dongguan University of Technology, Dongguan, China"}]},{"given":"Jianbin","family":"Qin","sequence":"additional","affiliation":[{"name":"Shenzhen Institute of Computing Sciences, Shenzhen University, Shenzhen, China"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"University of New South Wales, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2021,7,11]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Lempitsky","author":"Babenko Artem","year":"2015","unstructured":"Artem Babenko and Victor S. Lempitsky. 2015. Aggregating Local Deep Features for Image Retrieval. In ICCV. IEEE Computer Society, 1269--1277."},{"key":"e_1_3_2_2_2_1","unstructured":"Wieland Brendel Jonas Rauber and Matthias Bethge. 2018. Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models. In ICLR (Poster). OpenReview.net."},{"key":"e_1_3_2_2_3_1","volume-title":"Knoll","author":"Brunner Thomas","year":"2019","unstructured":"Thomas Brunner, Frederik Diehl, Michael Truong-Le, and Alois C. Knoll. 2019. Guessing Smart: Biased Sampling for Efficient Black-Box Adversarial Attacks. In ICCV. IEEE, 4957--4965."},{"key":"e_1_3_2_2_4_1","volume-title":"VGGFace2: A Dataset for Recognising Faces across Pose and Age","author":"Cao Qiong","unstructured":"Qiong Cao, Li Shen, Weidi Xie, Omkar M. Parkhi, and Andrew Zisserman. 2018. VGGFace2: A Dataset for Recognising Faces across Pose and Age. In FG. IEEE Computer Society, 67--74."},{"key":"e_1_3_2_2_5_1","volume-title":"Towards Evaluating the Robustness of Neural Networks. In IEEE Symposium on Security and Privacy. IEEE Computer Society, 39--57","author":"Carlini Nicholas","unstructured":"Nicholas Carlini and David A. Wagner. 2017. Towards Evaluating the Robustness of Neural Networks. In IEEE Symposium on Security and Privacy. IEEE Computer Society, 39--57."},{"key":"e_1_3_2_2_6_1","volume-title":"DeepDriving: Learning Affordance for Direct Perception in Autonomous Driving","author":"Chen Chenyi","unstructured":"Chenyi Chen, Ari Seff, Alain L. Kornhauser, and Jianxiong Xiao. 2015. DeepDriving: Learning Affordance for Direct Perception in Autonomous Driving. In ICCV. IEEE Computer Society, 2722--2730."},{"key":"e_1_3_2_2_7_1","volume-title":"HopSkipJumpAttack: A Query-Efficient Decision-Based Attack. In IEEE Symposium on Security and Privacy. IEEE, 1277--1294","author":"Chen Jianbo","unstructured":"Jianbo Chen, Michael I. Jordan, and Martin J. Wainwright. 2020. HopSkipJumpAttack: A Query-Efficient Decision-Based Attack. In IEEE Symposium on Security and Privacy. IEEE, 1277--1294."},{"key":"e_1_3_2_2_8_1","unstructured":"Pin-Yu Chen Huan Zhang Yash Sharma Jinfeng Yi and Cho-Jui Hsieh. 2017.ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Net-works without Training Substitute Models. In AISec@CCS. ACM 15--26."},{"key":"e_1_3_2_2_9_1","unstructured":"Minhao Cheng Thong Le Pin-Yu Chen Huan Zhang Jinfeng Yi and Cho-Jui Hsieh. 2019. Query-Efficient Hard-label Black-box Attack: An Optimization-based Approach. In ICLR (Poster). OpenReview.net."},{"key":"e_1_3_2_2_10_1","unstructured":"Minhao Cheng Simranjit Singh Patrick H. Chen Pin-Yu Chen Sijia Liu and Cho-Jui Hsieh. 2020. Sign-OPT: A Query-Efficient Hard-label Adversarial Attack. In ICLR. OpenReview.net."},{"key":"e_1_3_2_2_11_1","unstructured":"Shuyu Cheng Yinpeng Dong Tianyu Pang Hang Su and Jun Zhu. 2019. Improving Black-box Adversarial Attacks with a Transfer-based Prior. In NeurIPS. 10932--10942."},{"key":"e_1_3_2_2_12_1","volume-title":"ImageNet: A large-scale hierarchical image database","author":"Deng Jia","unstructured":"Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Fei-Fei Li. 2009. ImageNet: A large-scale hierarchical image database. In CVPR. IEEE Computer Society, 248--255."},{"key":"e_1_3_2_2_13_1","volume-title":"Efficient Decision-Based Black-Box Adversarial Attacks on Face Recognition","author":"Dong Yinpeng","unstructured":"Yinpeng Dong, Hang Su, Baoyuan Wu, Zhifeng Li, Wei Liu, Tong Zhang, and Jun Zhu. 2019. Efficient Decision-Based Black-Box Adversarial Attacks on Face Recognition. In CVPR. Computer Vision Foundation \/ IEEE, 7714--7722."},{"key":"e_1_3_2_2_14_1","unstructured":"Ian J. Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In ICLR (Poster)."},{"key":"e_1_3_2_2_15_1","unstructured":"Jiatao Gu James Bradbury Caiming Xiong Victor O. K. Li and Richard Socher. 2018. Non-Auto regressive Neural Machine Translation. InICLR (Poster). OpenRe-view.net."},{"key":"e_1_3_2_2_16_1","volume-title":"Deep Residual Learning for Image Recognition","author":"He Kaiming","unstructured":"Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep Residual Learning for Image Recognition. In CVPR. IEEE Computer Society, 770--778."},{"key":"e_1_3_2_2_17_1","volume-title":"ICML (Proceedings of Machine Learning Research","volume":"2151","author":"Ilyas Andrew","year":"2018","unstructured":"Andrew Ilyas, Logan Engstrom, Anish Athalye, and Jessy Lin. 2018. Black-box Adversarial Attacks with Limited Queries and Information. In ICML (Proceedings of Machine Learning Research, Vol. 80). PMLR, 2142--2151."},{"key":"e_1_3_2_2_18_1","volume-title":"Cross-Dimensional Weighting for Aggregated Deep Convolutional Features. In ECCV Workshops (1) (Lecture Notes in Computer Science","volume":"701","author":"Kalantidis Yannis","year":"2016","unstructured":"Yannis Kalantidis, Clayton Mellina, and Simon Osindero. 2016. Cross-Dimensional Weighting for Aggregated Deep Convolutional Features. In ECCV Workshops (1) (Lecture Notes in Computer Science, Vol. 9913). Springer, 685--701."},{"key":"e_1_3_2_2_19_1","volume-title":"Large-Scale Video Classification with Convolutional Neural Networks","author":"Karpathy Andrej","unstructured":"Andrej Karpathy, George Toderici, Sanketh Shetty, Thomas Leung, Rahul Sukthankar, and Fei-Fei Li. 2014. Large-Scale Video Classification with Convolutional Neural Networks. In CVPR. IEEE Computer Society, 1725--1732."},{"key":"e_1_3_2_2_20_1","volume-title":"3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7--9, 2015, Conference Track Proceedings. http:\/\/arxiv.org\/abs\/1412","author":"Diederik","unstructured":"Diederik P. Kingma and Jimmy Ba. 2015.Adam: A Method for Stochastic Optimization. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7--9, 2015, Conference Track Proceedings. http:\/\/arxiv.org\/abs\/1412.6980"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"Alexey Kurakin Ian J. Goodfellow and Samy Bengio. 2017. Adversarial examples in the physical world. In ICLR (Workshop). OpenReview.net.","DOI":"10.1201\/9781351251389-8"},{"key":"e_1_3_2_2_22_1","volume-title":"QEBA: Query-Efficient Boundary-Based Blackbox Attack","author":"Li Huichen","year":"2020","unstructured":"Huichen Li, Xiaojun Xu, Xiaolu Zhang, Shuang Yang, and Bo Li. 2020. QEBA: Query-Efficient Boundary-Based Blackbox Attack. In CVPR. IEEE, 1218--1227."},{"key":"e_1_3_2_2_23_1","volume-title":"Universal Perturbation Attack Against Image Retrieval","author":"Li Jie","unstructured":"Jie Li, Rongrong Ji, Hong Liu, Xiaopeng Hong, Yue Gao, and Qi Tian. 2019. Universal Perturbation Attack Against Image Retrieval. In ICCV. IEEE, 4898--4907."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Sijia Liu Bhavya Kailkhura Pin-Yu Chen Pai-Shun Ting Shiyu Chang and Lisa Amini. 2018. Zeroth-Order Stochastic Variance Reduction for Nonconvex Optimization. In NeurIPS. 3731--3741.","DOI":"10.1109\/GlobalSIP.2018.8646618"},{"key":"e_1_3_2_2_25_1","unstructured":"Yanpei Liu Xinyun Chen Chang Liu and Dawn Song. 2017. Delving into Transferable Adversarial Examples and Black-box Attacks. InICLR (Poster). OpenReview.net."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3323873.3325052"},{"key":"e_1_3_2_2_27_1","volume-title":"Fully convolutional networks for semantic segmentation","author":"Long Jonathan","unstructured":"Jonathan Long, Evan Shelhamer, and Trevor Darrell. 2015. Fully convolutional networks for semantic segmentation. In CVPR. IEEE Computer Society, 3431--3440."},{"key":"e_1_3_2_2_28_1","volume-title":"Accurate Monocular 3D Object Detection via Color-Embedded 3D Reconstruction for Autonomous Driving","author":"Ma Xinzhu","unstructured":"Xinzhu Ma, Zhihui Wang, Haojie Li, Pengbo Zhang, Wanli Ouyang, and Xin Fan. 2019. Accurate Monocular 3D Object Detection via Color-Embedded 3D Reconstruction for Autonomous Driving. In ICCV. IEEE, 6850--6859."},{"key":"e_1_3_2_2_29_1","unstructured":"Aleksander Madry Aleksandar Makelov Ludwig Schmidt Dimitris Tsipras and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In ICLR (Poster). OpenReview.net."},{"key":"e_1_3_2_2_30_1","volume-title":"Universal Adversarial Perturbations","author":"Moosavi-Dezfooli Seyed-Mohsen","unstructured":"Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, Omar Fawzi, and Pascal Frossard. 2017. Universal Adversarial Perturbations. In CVPR. IEEE Computer Society, 86--94."},{"key":"e_1_3_2_2_31_1","volume-title":"DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks","author":"Moosavi-Dezfooli Seyed-Mohsen","unstructured":"Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, and Pascal Frossard. 2016. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks. In CVPR. IEEE Computer Society, 2574--2582."},{"key":"e_1_3_2_2_32_1","volume-title":"Revisiting Oxford and","author":"Radenovic Filip","unstructured":"Filip Radenovic, Ahmet Iscen, Giorgos Tolias, Yannis Avrithis, and Ondrej Chum. 2018. Revisiting Oxford and Paris: Large-Scale Image Retrieval Benchmarking. In CVPR. IEEE Computer Society, 5706--5715."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2846566"},{"key":"e_1_3_2_2_34_1","volume-title":"From single image query to detailed 3D reconstruction","author":"Schonberger Johannes L.","unstructured":"Johannes L. Schonberger, Filip Radenovic, Ondrej Chum, and Jan-Michael Frahm.2015. From single image query to detailed 3D reconstruction. In CVPR. IEEE Computer Society, 5126--5134."},{"key":"e_1_3_2_2_35_1","volume-title":"FaceNet: A unified embedding for face recognition and clustering","author":"Schroff Florian","unstructured":"Florian Schroff, Dmitry Kalenichenko, and James Philbin. 2015. FaceNet: A unified embedding for face recognition and clustering. In CVPR. IEEE Computer Society, 815--823."},{"key":"e_1_3_2_2_36_1","unstructured":"Karen Simonyan and Andrew Zisserman. 2015. Very Deep Convolutional Net-works for Large-Scale Image Recognition. In ICLR."},{"key":"e_1_3_2_2_37_1","volume-title":"Going deeper with convolutions","author":"Szegedy Christian","unstructured":"Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott E. Reed,Dragomir Anguelov, Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. 2015. Going deeper with convolutions. In CVPR. IEEE Computer Society, 1--9."},{"key":"e_1_3_2_2_38_1","unstructured":"Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian J. Goodfellow and Rob Fergus. 2014. Intriguing properties of neural networks. In ICLR (Poster)."},{"key":"e_1_3_2_2_39_1","volume-title":"Targeted Mismatch Adversarial Attack: Query With a Flower to Retrieve the Tower","author":"Tolias Giorgos","unstructured":"Giorgos Tolias, Filip Radenovic, and Ondrej Chum. 2019. Targeted Mismatch Adversarial Attack: Query With a Flower to Retrieve the Tower. In ICCV. IEEE, 5036--5045."},{"key":"e_1_3_2_2_40_1","unstructured":"Giorgos Tolias Ronan Sicre and Herv\u00e9 J\u00e9gou. 2016. Particular object retrieval with integral max-pooling of CNN activations. In ICLR (Poster)."},{"key":"e_1_3_2_2_41_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N. Gomez Lukasz Kaiser and Illia Polosukhin. 2017. Attention is All you Need. In NIPS. 5998--6008."},{"key":"e_1_3_2_2_42_1","volume-title":"Pengcheng Wu, Jianke Zhu, Yong-dong Zhang, and Jintao Li.","author":"Wan Ji","year":"2014","unstructured":"Ji Wan, Dayong Wang, Steven Chu-Hong Hoi, Pengcheng Wu, Jianke Zhu, Yong-dong Zhang, and Jintao Li. 2014. Deep Learning for Content-Based Image Retrieval: A Comprehensive Study. In ACM Multimedia. ACM, 157--166."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2638566"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992696"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2833032"},{"key":"e_1_3_2_2_46_1","volume-title":"Super-vised Hashing for Image Retrieval via Image Representation Learning","author":"Xia Rongkai","unstructured":"Rongkai Xia, Yan Pan, Hanjiang Lai, Cong Liu, and Shuicheng Yan. 2014. Super-vised Hashing for Image Retrieval via Image Representation Learning. In AAAI. AAAI Press, 2156--2162."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2882908"},{"key":"e_1_3_2_2_48_1","volume-title":"Unsupervised Adversarial Attacks on Deep Feature-based Retrieval with GAN.CoRRabs\/1907.05793","author":"Zhao Guoping","year":"2019","unstructured":"Guoping Zhao, Mingyu Zhang, Jiajun Liu, and Ji-Rong Wen. 2019. Unsupervised Adversarial Attacks on Deep Feature-based Retrieval with GAN.CoRRabs\/1907.05793 (2019)."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3036801"},{"key":"e_1_3_2_2_50_1","volume-title":"Adversarial Ranking Attack and Defense. CoRRabs\/2002.11293","author":"Zhou Mo","year":"2020","unstructured":"Mo Zhou, Zhenxing Niu, Le Wang, Qilin Zhang, and Gang Hua. 2020. Adversarial Ranking Attack and Defense. CoRRabs\/2002.11293 (2020)."}],"event":{"name":"SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval","location":"Virtual Event Canada","acronym":"SIGIR '21","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404835.3462887","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3404835.3462887","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:18Z","timestamp":1750193238000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404835.3462887"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,11]]},"references-count":50,"alternative-id":["10.1145\/3404835.3462887","10.1145\/3404835"],"URL":"https:\/\/doi.org\/10.1145\/3404835.3462887","relation":{},"subject":[],"published":{"date-parts":[[2021,7,11]]},"assertion":[{"value":"2021-07-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}