{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:25:03Z","timestamp":1755926703908,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Dongguan Songshan Lake Introduction Program of Leading Innovative and Entrepreneurial Talents"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20B2063 and 61976049"],"award-info":[{"award-number":["U20B2063 and 61976049"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3503161.3548138","type":"proceedings-article","created":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T15:43:01Z","timestamp":1665416581000},"page":"610-618","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["ARRA: Absolute-Relative Ranking Attack against Image Retrieval"],"prefix":"10.1145","author":[{"given":"Siyuan","family":"Li","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Xing","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Zailei","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Yang","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China &amp; Institute of Electronic and Information Engineering of UESTC, Chengdu, China"}]},{"given":"Guoqing","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Heng Tao","family":"Shen","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China &amp; Peng Cheng Laboratory, Chengdu, China"}]}],"member":"320","published-online":{"date-parts":[[2022,10,10]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Sign Bits Are All You Need for Black-Box Attacks. In 8th International Conference on Learning Representations, ICLR","author":"Al-Dujaili Abdullah","year":"2020","unstructured":"Abdullah Al-Dujaili and Una-May O'Reilly . 2020 . Sign Bits Are All You Need for Black-Box Attacks. In 8th International Conference on Learning Representations, ICLR 2020. Abdullah Al-Dujaili and Una-May O'Reilly. 2020. Sign Bits Are All You Need for Black-Box Attacks. In 8th International Conference on Learning Representations, ICLR 2020."},{"key":"e_1_3_2_2_2_1","volume-title":"Square Attack: A Query-Efficient Black-Box Adversarial Attack via Random Search. In Computer Vision - ECCV 2020 - 16th European Conference (Lecture Notes in Computer Science","author":"Andriushchenko Maksym","year":"2020","unstructured":"Maksym Andriushchenko , Francesco Croce , Nicolas Flammarion , and Matthias Hein . 2020 . Square Attack: A Query-Efficient Black-Box Adversarial Attack via Random Search. In Computer Vision - ECCV 2020 - 16th European Conference (Lecture Notes in Computer Science , Vol. 12368). 484-- 501 . Maksym Andriushchenko, Francesco Croce, Nicolas Flammarion, and Matthias Hein. 2020. Square Attack: A Query-Efficient Black-Box Adversarial Attack via Random Search. In Computer Vision - ECCV 2020 - 16th European Conference (Lecture Notes in Computer Science, Vol. 12368). 484--501."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2188385.2188395"},{"key":"e_1_3_2_2_4_1","volume-title":"Towards Evaluating the Robustness of Neural Networks. In 2017 IEEE Symposium on Security and Privacy, SP","author":"Carlini Nicholas","year":"2017","unstructured":"Nicholas Carlini and David A. Wagner . 2017 . Towards Evaluating the Robustness of Neural Networks. In 2017 IEEE Symposium on Security and Privacy, SP 2017 . 39--57. Nicholas Carlini and David A. Wagner. 2017. Towards Evaluating the Robustness of Neural Networks. In 2017 IEEE Symposium on Security and Privacy, SP 2017. 39--57."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.202"},{"key":"e_1_3_2_2_7_1","volume-title":"Boosting Adversarial Attacks With Momentum. In 2018 IEEE Conference on Computer Vision and Pattern Recognition, CVPR","author":"Dong Yinpeng","year":"2018","unstructured":"Yinpeng Dong , Fangzhou Liao , Tianyu Pang , Hang Su , Jun Zhu , Xiaolin Hu , and Jianguo Li . 2018 . Boosting Adversarial Attacks With Momentum. In 2018 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2018. 9185--9193. Yinpeng Dong, Fangzhou Liao, Tianyu Pang, Hang Su, Jun Zhu, Xiaolin Hu, and Jianguo Li. 2018. Boosting Adversarial Attacks With Momentum. In 2018 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2018. 9185--9193."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00444"},{"volume-title":"Computer Vision - ECCV 2020 - 16th European Conference (Lecture Notes in Computer Science","author":"Gao Lianli","key":"e_1_3_2_2_9_1","unstructured":"Lianli Gao , Qilong Zhang , Jingkuan Song , Xianglong Liu , and Heng Tao Shen . 2020. Patch-Wise Attack for Fooling Deep Neural Network . In Computer Vision - ECCV 2020 - 16th European Conference (Lecture Notes in Computer Science , Vol. 12373). 307-- 322 . Lianli Gao, Qilong Zhang, Jingkuan Song, Xianglong Liu, and Heng Tao Shen. 2020. Patch-Wise Attack for Fooling Deep Neural Network. In Computer Vision - ECCV 2020 - 16th European Conference (Lecture Notes in Computer Science, Vol. 12373). 307--322."},{"key":"e_1_3_2_2_10_1","volume-title":"Scott","author":"Ge Weifeng","year":"2018","unstructured":"Weifeng Ge , Weilin Huang , Dengke Dong , and Matthew R . Scott . 2018 . Deep Metric Learning with Hierarchical Triplet Loss. In Computer Vision - ECCV 2018 - 15th European Conference (Lecture Notes in Computer Science , Vol. 11210). 272-- 288 . Weifeng Ge, Weilin Huang, Dengke Dong, and Matthew R. Scott. 2018. Deep Metric Learning with Hierarchical Triplet Loss. In Computer Vision - ECCV 2018 - 15th European Conference (Lecture Notes in Computer Science, Vol. 11210). 272--288."},{"key":"e_1_3_2_2_11_1","volume-title":"Explaining and Harnessing Adversarial Examples. In 3rd International Conference on Learning Representations, ICLR","author":"Goodfellow Ian J.","year":"2015","unstructured":"Ian J. Goodfellow , Jonathon Shlens , and Christian Szegedy . 2015 . Explaining and Harnessing Adversarial Examples. In 3rd International Conference on Learning Representations, ICLR 2015. Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In 3rd International Conference on Learning Representations, ICLR 2015."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2006.100"},{"key":"e_1_3_2_2_13_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning, ICML 2018 (Proceedings of Machine Learning Research","volume":"2151","author":"Ilyas Andrew","year":"2018","unstructured":"Andrew Ilyas , Logan Engstrom , Anish Athalye , and Jessy Lin . 2018 . Black-box Adversarial Attacks with Limited Queries and Information . In Proceedings of the 35th International Conference on Machine Learning, ICML 2018 (Proceedings of Machine Learning Research , Vol. 80). 2142-- 2151 . Andrew Ilyas, Logan Engstrom, Anish Athalye, and Jessy Lin. 2018. Black-box Adversarial Attacks with Limited Queries and Information. In Proceedings of the 35th International Conference on Machine Learning, ICML 2018 (Proceedings of Machine Learning Research, Vol. 80). 2142--2151."},{"key":"e_1_3_2_2_14_1","volume-title":"Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors. In 7th International Conference on Learning Representations, ICLR","author":"Ilyas Andrew","year":"2019","unstructured":"Andrew Ilyas , Logan Engstrom , and Aleksander Madry . 2019 . Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors. In 7th International Conference on Learning Representations, ICLR 2019. Andrew Ilyas, Logan Engstrom, and Aleksander Madry. 2019. Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors. In 7th International Conference on Learning Representations, ICLR 2019."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/33.3.239"},{"key":"e_1_3_2_2_16_1","volume-title":"Quadruplet-Wise Image Similarity Learning. In IEEE International Conference on Computer Vision, ICCV","author":"Law Marc T.","year":"2013","unstructured":"Marc T. Law , Nicolas Thome , and Matthieu Cord . 2013 . Quadruplet-Wise Image Similarity Learning. In IEEE International Conference on Computer Vision, ICCV 2013. 249--256. Marc T. Law, Nicolas Thome, and Matthieu Cord. 2013. Quadruplet-Wise Image Similarity Learning. In IEEE International Conference on Computer Vision, ICCV 2013. 249--256."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00222"},{"key":"e_1_3_2_2_18_1","volume-title":"Universal Perturbation Attack Against Image Retrieval. In 2019 IEEE\/CVF International Conference on Computer Vision, ICCV","author":"Li Jie","year":"2019","unstructured":"Jie Li , Rongrong Ji , Hong Liu , Xiaopeng Hong , Yue Gao , and Qi Tian . 2019 . Universal Perturbation Attack Against Image Retrieval. In 2019 IEEE\/CVF International Conference on Computer Vision, ICCV 2019. 4898--4907. Jie Li, Rongrong Ji, Hong Liu, Xiaopeng Hong, Yue Gao, and Qi Tian. 2019. Universal Perturbation Attack Against Image Retrieval. In 2019 IEEE\/CVF International Conference on Computer Vision, ICCV 2019. 4898--4907."},{"key":"e_1_3_2_2_19_1","volume-title":"QAIR: Practical Query-Efficient Black-Box Attacks for Image Retrieval. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR","author":"Li Xiaodan","year":"2021","unstructured":"Xiaodan Li , Jinfeng Li , Yuefeng Chen , Shaokai Ye , Yuan He , Shuhui Wang , Hang Su , and Hui Xue . 2021 . QAIR: Practical Query-Efficient Black-Box Attacks for Image Retrieval. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2021. 3330--3339. Xiaodan Li, Jinfeng Li, Yuefeng Chen, Shaokai Ye, Yuan He, Shuhui Wang, Hang Su, and Hui Xue. 2021. QAIR: Practical Query-Efficient Black-Box Attacks for Image Retrieval. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2021. 3330--3339."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.124"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_3_2_2_22_1","volume-title":"6th International Conference on Learning Representations, ICLR","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry , Aleksandar Makelov , Ludwig Schmidt , Dimitris Tsipras , and Adrian Vladu . 2018 . Towards Deep Learning Models Resistant to Adversarial Attacks . In 6th International Conference on Learning Representations, ICLR 2018. Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In 6th International Conference on Learning Representations, ICLR 2018."},{"key":"e_1_3_2_2_23_1","volume-title":"Universal Adversarial Perturbations. In 2017 IEEE Conference on Computer Vision and Pattern Recognition, CVPR","author":"Moosavi-Dezfooli Seyed-Mohsen","year":"2017","unstructured":"Seyed-Mohsen Moosavi-Dezfooli , Alhussein Fawzi , Omar Fawzi , and Pascal Frossard . 2017 . Universal Adversarial Perturbations. In 2017 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017. 86--94. Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, Omar Fawzi, and Pascal Frossard. 2017. Universal Adversarial Perturbations. In 2017 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017. 86--94."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_2_25_1","volume-title":"The Limitations of Deep Learning in Adversarial Settings. In IEEE European Symposium on Security and Privacy, EuroS&P","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Patrick D. McDaniel , Somesh Jha , Matt Fredrikson , Z. Berkay Celik , and Ananthram Swami . 2016 . The Limitations of Deep Learning in Adversarial Settings. In IEEE European Symposium on Security and Privacy, EuroS&P 2016. 372--387. Nicolas Papernot, Patrick D. McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, and Ananthram Swami. 2016. The Limitations of Deep Learning in Adversarial Settings. In IEEE European Symposium on Security and Privacy, EuroS&P 2016. 372--387."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_3_2_2_28_1","volume-title":"Improved Deep Metric Learning with Multi-class N-pair Loss Objective. In Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016. 1849","author":"Sohn Kihyuk","year":"2016","unstructured":"Kihyuk Sohn . 2016 . Improved Deep Metric Learning with Multi-class N-pair Loss Objective. In Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016. 1849 --1857. Kihyuk Sohn. 2016. Improved Deep Metric Learning with Multi-class N-pair Loss Objective. In Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016. 1849--1857."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.434"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.434"},{"key":"e_1_3_2_2_31_1","volume-title":"2nd International Conference on Learning Representations, ICLR","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian J. Goodfellow , and Rob Fergus . 2014 . Intriguing properties of neural networks . In 2nd International Conference on Learning Representations, ICLR 2014. Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian J. Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In 2nd International Conference on Learning Representations, ICLR 2014."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00514"},{"key":"e_1_3_2_2_33_1","unstructured":"Catherine Wah Steve Branson Peter Welinder Pietro Perona and Serge Belongie. 2011. The caltech-ucsd birds-200--2011 dataset. (2011).  Catherine Wah Steve Branson Peter Welinder Pietro Perona and Serge Belongie. 2011. The caltech-ucsd birds-200--2011 dataset. (2011)."},{"key":"e_1_3_2_2_34_1","volume-title":"Multi-Similarity Loss With General Pair Weighting for Deep Metric Learning. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR","author":"Wang Xun","year":"2019","unstructured":"Xun Wang , Xintong Han , Weilin Huang , Dengke Dong , and Matthew R. Scott . 2019 . Multi-Similarity Loss With General Pair Weighting for Deep Metric Learning. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2019 . 5022--5030. Xun Wang, Xintong Han, Weilin Huang, Dengke Dong, and Matthew R. Scott. 2019. Multi-Similarity Loss With General Pair Weighting for Deep Metric Learning. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2019. 5022--5030."},{"key":"e_1_3_2_2_35_1","first-page":"1934","article-title":"You See What I Want You To See: Exploring Targeted Black-Box Transferability Attack for Hash-Based Image Retrieval Systems. In IEEE Conference on Computer Vision and Pattern Recognition","volume":"2021","author":"Xiao Yanru","year":"2021","unstructured":"Yanru Xiao and Cong Wang . 2021 . You See What I Want You To See: Exploring Targeted Black-Box Transferability Attack for Hash-Based Image Retrieval Systems. In IEEE Conference on Computer Vision and Pattern Recognition , CVPR 2021. 1934 -- 1943 . Yanru Xiao and Cong Wang. 2021. You See What I Want You To See: Exploring Targeted Black-Box Transferability Attack for Hash-Based Image Retrieval Systems. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2021. 1934--1943.","journal-title":"CVPR"},{"key":"e_1_3_2_2_36_1","volume-title":"Improving Transferability of Adversarial Examples With Input Diversity. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR","author":"Xie Cihang","year":"2019","unstructured":"Cihang Xie , Zhishuai Zhang , Yuyin Zhou , Song Bai , Jianyu Wang , Zhou Ren , and Alan L. Yuille . 2019 . Improving Transferability of Adversarial Examples With Input Diversity. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2019 . 2730--2739. Cihang Xie, Zhishuai Zhang, Yuyin Zhou, Song Bai, Jianyu Wang, Zhou Ren, and Alan L. Yuille. 2019. Improving Transferability of Adversarial Examples With Input Diversity. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2019. 2730--2739."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.3009004"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3045530"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2967597"},{"volume-title":"Computer Vision - ECCV 2020 - 16th European Conference (Lecture Notes in Computer Science","author":"Zhou Mo","key":"e_1_3_2_2_40_1","unstructured":"Mo Zhou , Zhenxing Niu , Le Wang , Qilin Zhang , and Gang Hua . 2020. Adversarial Ranking Attack and Defense . In Computer Vision - ECCV 2020 - 16th European Conference (Lecture Notes in Computer Science , Vol. 12359). 781-- 799 . Mo Zhou, Zhenxing Niu, Le Wang, Qilin Zhang, and Gang Hua. 2020. Adversarial Ranking Attack and Defense. In Computer Vision - ECCV 2020 - 16th European Conference (Lecture Notes in Computer Science, Vol. 12359). 781--799."},{"key":"e_1_3_2_2_41_1","volume-title":"Practical Relative Order Attack in Deep Ranking. CoRR abs\/2103.05248","author":"Zhou Mo","year":"2021","unstructured":"Mo Zhou , Le Wang , Zhenxing Niu , Qilin Zhang , Yinghui Xu , Nanning Zheng , and Gang Hua . 2021. Practical Relative Order Attack in Deep Ranking. CoRR abs\/2103.05248 ( 2021 ). Mo Zhou, Le Wang, Zhenxing Niu, Qilin Zhang, Yinghui Xu, Nanning Zheng, and Gang Hua. 2021. Practical Relative Order Attack in Deep Ranking. CoRR abs\/2103.05248 (2021)."}],"event":{"name":"MM '22: The 30th ACM International Conference on Multimedia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Lisboa Portugal","acronym":"MM '22"},"container-title":["Proceedings of the 30th ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503161.3548138","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503161.3548138","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:19Z","timestamp":1750186819000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503161.3548138"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":41,"alternative-id":["10.1145\/3503161.3548138","10.1145\/3503161"],"URL":"https:\/\/doi.org\/10.1145\/3503161.3548138","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2022-10-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}