{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T15:13:52Z","timestamp":1768317232782,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Fundamental Research Funds for the Central Universities","award":["XDB28000000"],"award-info":[{"award-number":["XDB28000000"]}]},{"name":"National Natural Science Foundation of China","award":["62236008 U21B2038 61931008 6212200758 and 61976202"],"award-info":[{"award-number":["62236008 U21B2038 61931008 6212200758 and 61976202"]}]},{"name":"National Key R&D Program of China","award":["2018AAA0102000"],"award-info":[{"award-number":["2018AAA0102000"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,26]]},"DOI":"10.1145\/3581783.3611846","type":"proceedings-article","created":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T19:52:20Z","timestamp":1698436340000},"page":"1515-1526","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["When Measures are Unreliable: Imperceptible Adversarial Perturbations toward Top-k Multi-Label Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-8895-5380","authenticated-orcid":false,"given":"Yuchen","family":"Sun","sequence":"first","affiliation":[{"name":"IIP, ICT, CAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3512-7277","authenticated-orcid":false,"given":"Qianqian","family":"Xu","sequence":"additional","affiliation":[{"name":"IIP, ICT, CAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4156-6417","authenticated-orcid":false,"given":"Zitai","family":"Wang","sequence":"additional","affiliation":[{"name":"SKLOIS, IIE, CAS &amp; SCS, UCAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8793-6953","authenticated-orcid":false,"given":"Qingming","family":"Huang","sequence":"additional","affiliation":[{"name":"SCST, UCAS; IIP, ICT, CAS; BDKM, CAS; &amp; Peng Cheng Laboratory, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,27]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Pg Emeroylariffion Abas, and Abdul Ghani Naim","author":"Aneja Sandhya","year":"2022","unstructured":"Sandhya Aneja, Nagender Aneja, Pg Emeroylariffion Abas, and Abdul Ghani Naim. 2022. Defense against adversarial attacks on deep convolutional neural networks through nonlocal denoising. CoRR, Vol. abs\/2206.12685 (2022)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413663"},{"key":"e_1_3_2_2_3_1","volume-title":"Smooth Loss Functions for Deep Top-k Classification. In International Conference on Learning Representations.","author":"Berrada Leonard","unstructured":"Leonard Berrada, Andrew Zisserman, and M. Pawan Kumar. 2018. Smooth Loss Functions for Deep Top-k Classification. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_4_1","volume-title":"Multi-modal Learning Algorithms and Network Architectures for Information Extraction and Retrieval. In ACM International Conference on Multimedia. 6925--6929","author":"Bleeker Maurits J. R.","year":"2022","unstructured":"Maurits J. R. Bleeker. 2022. Multi-modal Learning Algorithms and Network Architectures for Information Extraction and Retrieval. In ACM International Conference on Multimedia. 6925--6929."},{"key":"e_1_3_2_2_5_1","volume-title":"Towards Evaluating the Robustness of Neural Networks. In IEEE Symposium on Security and Privacy. 39--57","author":"Carlini Nicholas","unstructured":"Nicholas Carlini and David A. Wagner. 2017. Towards Evaluating the Robustness of Neural Networks. In IEEE Symposium on Security and Privacy. 39--57."},{"key":"e_1_3_2_2_6_1","volume-title":"Robust Top-k Multiclass SVM for Visual Category Recognition. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 75--83","author":"Chang Xiaojun","year":"2017","unstructured":"Xiaojun Chang, Yaoliang Yu, and Yi Yang. 2017. Robust Top-k Multiclass SVM for Visual Category Recognition. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 75--83."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548118"},{"key":"e_1_3_2_2_8_1","volume-title":"Evaluating Robustness of Deep Image Super-Resolution Against Adversarial Attacks. In IEEE\/CVF International Conference on Computer Vision. 303--311","author":"Choi Jun-Ho","year":"2019","unstructured":"Jun-Ho Choi, Huan Zhang, Jun-Hyuk Kim, Cho-Jui Hsieh, and Jong-Seok Lee. 2019. Evaluating Robustness of Deep Image Super-Resolution Against Adversarial Attacks. In IEEE\/CVF International Conference on Computer Vision. 303--311."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1646396.1646452"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3202366"},{"key":"e_1_3_2_2_12_1","volume-title":"Boosting Adversarial Attacks With Momentum. In IEEE Conference on Computer Vision and Pattern Recognition. 9185--9193","author":"Dong Yinpeng","year":"2018","unstructured":"Yinpeng Dong, Fangzhou Liao, Tianyu Pang, Hang Su, Jun Zhu, Xiaolin Hu, and Jianguo Li. 2018. Boosting Adversarial Attacks With Momentum. In IEEE Conference on Computer Vision and Pattern Recognition. 9185--9193."},{"key":"e_1_3_2_2_13_1","volume-title":"Christopher K. I. Williams, John M. Winn, and Andrew Zisserman.","author":"Everingham Mark","year":"2015","unstructured":"Mark Everingham, S. M. Ali Eslami, Luc Van Gool, Christopher K. I. Williams, John M. Winn, and Andrew Zisserman. 2015. The Pascal Visual Object Classes Challenge: A Retrospective. International Journal of Computer Vision (2015), 98--136."},{"key":"e_1_3_2_2_14_1","volume-title":"Learning with Average Top-k Loss. In Annual Conference on Neural Information Processing Systems. 497--505","author":"Fan Yanbo","year":"2017","unstructured":"Yanbo Fan, Siwei Lyu, Yiming Ying, and Bao-Gang Hu. 2017. Learning with Average Top-k Loss. In Annual Conference on Neural Information Processing Systems. 497--505."},{"key":"e_1_3_2_2_15_1","volume-title":"Efficient Top Rank Optimization with Gradient Boosting for Supervised Anomaly Detection. In European Conference on Machine Learning and Knowledge Discovery in Databases. 20--35","author":"Fr\u00e9ry Jordan","year":"2017","unstructured":"Jordan Fr\u00e9ry, Amaury Habrard, Marc Sebban, Olivier Caelen, and Liyun He-Guelton. 2017. Efficient Top Rank Optimization with Gradient Boosting for Supervised Anomaly Detection. In European Conference on Machine Learning and Knowledge Discovery in Databases. 20--35."},{"key":"e_1_3_2_2_16_1","volume-title":"Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations.","author":"Goodfellow Ian J.","year":"2015","unstructured":"Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_17_1","volume-title":"Deep Residual Learning for Image Recognition. In IEEE Conference on Computer Vision and Pattern Recognition. 770--778","author":"He Kaiming","year":"2016","unstructured":"Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep Residual Learning for Image Recognition. In IEEE Conference on Computer Vision and Pattern Recognition. 770--778."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00755"},{"key":"e_1_3_2_2_19_1","volume-title":"Annual Conference on Neural Information Processing Systems.","author":"Hu Shu","year":"2020","unstructured":"Shu Hu, Yiming Ying, Xin Wang, and Siwei Lyu. 2020. Learning by Minimizing the Sum of Ranked Range. In Annual Conference on Neural Information Processing Systems."},{"key":"e_1_3_2_2_20_1","volume-title":"DSE-GAN: Dynamic Semantic Evolution Generative Adversarial Network for Text-to-Image Generation. In ACM International Conference on Multimedia. 4345--4354","author":"Huang Mengqi","year":"2022","unstructured":"Mengqi Huang, Zhendong Mao, Penghui Wang, Quan Wang, and Yongdong Zhang. 2022. DSE-GAN: Dynamic Semantic Evolution Generative Adversarial Network for Text-to-Image Generation. In ACM International Conference on Multimedia. 4345--4354."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6311"},{"key":"e_1_3_2_2_22_1","volume-title":"Stable Neural ODE with Lyapunov-Stable Equilibrium Points for Defending Against Adversarial Attacks. In Annual Conference on Neural Information Processing Systems. 14925--14937","author":"Kang Qiyu","year":"2021","unstructured":"Qiyu Kang, Yang Song, Qinxu Ding, and Wee Peng Tay. 2021. Stable Neural ODE with Lyapunov-Stable Equilibrium Points for Defending Against Adversarial Attacks. In Annual Conference on Neural Information Processing Systems. 14925--14937."},{"key":"e_1_3_2_2_23_1","volume-title":"Art of Singular Vectors and Universal Adversarial Perturbations. In IEEE Conference on Computer Vision and Pattern Recognition.","author":"Khrulkov Valentin","unstructured":"Valentin Khrulkov and Ivan V. Oseledets. 2018. Art of Singular Vectors and Universal Adversarial Perturbations. In IEEE Conference on Computer Vision and Pattern Recognition."},{"key":"e_1_3_2_2_24_1","volume-title":"International Conference on Learning Representations.","author":"Kurakin Alexey","year":"2017","unstructured":"Alexey Kurakin, Ian J. Goodfellow, and Samy Bengio. 2017. Adversarial Machine Learning at Scale. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20023"},{"key":"e_1_3_2_2_26_1","volume-title":"Deep Multi-Similarity Hashing for Multi-label Image Retrieval. In ACM on Conference on Information and Knowledge Management. 2159--2162","author":"Li Tong","year":"2017","unstructured":"Tong Li, Sheng Gao, and Yajing Xu. 2017. Deep Multi-Similarity Hashing for Multi-label Image Retrieval. In ACM on Conference on Information and Knowledge Management. 2159--2162."},{"key":"e_1_3_2_2_27_1","volume-title":"Quaternion-Based Knowledge Graph Network for Recommendation. In ACM International Conference on Multimedia. 880--888","author":"Li Zhaopeng","year":"2020","unstructured":"Zhaopeng Li, Qianqian Xu, Yangbangyan Jiang, Xiaochun Cao, and Qingming Huang. 2020. Quaternion-Based Knowledge Graph Network for Recommendation. In ACM International Conference on Multimedia. 880--888."},{"key":"e_1_3_2_2_28_1","volume-title":"Microsoft COCO: Common Objects in Context. In European Conference on Computer Vision. 740--755","author":"Lin Tsung-Yi","unstructured":"Tsung-Yi Lin, Michael Maire, Serge J. Belongie, James Hays, Pietro Perona, Deva Ramanan, Piotr Doll\u00e1r, and C. Lawrence Zitnick. 2014. Microsoft COCO: Common Objects in Context. In European Conference on Computer Vision. 740--755."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.713"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00303"},{"key":"e_1_3_2_2_31_1","volume-title":"International Joint Conference on Artificial Intelligence. 1781--1787","author":"Liu Li-Ping","year":"2016","unstructured":"Li-Ping Liu, Thomas G. Dietterich, Nan Li, and Zhi-Hua Zhou. 2016. Transductive Optimization of Top k Precision. In International Joint Conference on Artificial Intelligence. 1781--1787."},{"key":"e_1_3_2_2_32_1","volume-title":"Knowledge-Enhanced Top-K Recommendation in Poincar\u00e9 Ball. In AAAI Conference on Artificial Intelligence. 4285--4293","author":"Ma Chen","year":"2021","unstructured":"Chen Ma, Liheng Ma, Yingxue Zhang, Haolun Wu, Xue Liu, and Mark Coates. 2021. Knowledge-Enhanced Top-K Recommendation in Poincar\u00e9 Ball. In AAAI Conference on Artificial Intelligence. 4285--4293."},{"key":"e_1_3_2_2_33_1","volume-title":"TrackFormer: Multi-Object Tracking with Transformers. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 8834--8844","author":"Meinhardt Tim","year":"2022","unstructured":"Tim Meinhardt, Alexander Kirillov, Laura Leal-Taix\u00e9, and Christoph Feichtenhofer. 2022. TrackFormer: Multi-Object Tracking with Transformers. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 8834--8844."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3137564"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i02.5492"},{"key":"e_1_3_2_2_36_1","volume-title":"Universal Adversarial Perturbations. In IEEE Conference on Computer Vision and Pattern Recognition. 86--94","author":"Moosavi-Dezfooli Seyed-Mohsen","year":"2017","unstructured":"Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, Omar Fawzi, and Pascal Frossard. 2017. Universal Adversarial Perturbations. In IEEE Conference on Computer Vision and Pattern Recognition. 86--94."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Wlodzimierz Ogryczak and Arie Tamir. 2003. Minimizing the sum of the k largest functions in linear time. Inform. Process. Lett. (2003) 117--122.","DOI":"10.1016\/S0020-0190(02)00370-8"},{"key":"e_1_3_2_2_39_1","volume-title":"High-Performance Deep Learning Library. In Annual Conference on Neural Information Processing Systems. 8024--8035","author":"Paszke Adam","year":"2019","unstructured":"Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas K\u00f6pf, Edward Z. Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Annual Conference on Neural Information Processing Systems. 8024--8035."},{"key":"e_1_3_2_2_40_1","volume-title":"Text Perceptron: Towards End-to-End Arbitrary-Shaped Text Spotting. In AAAI Conference on Artificial Intelligence. 11899--11907","author":"Qiao Liang","year":"2020","unstructured":"Liang Qiao, Sanli Tang, Zhanzhan Cheng, Yunlu Xu, Yi Niu, Shiliang Pu, and Fei Wu. 2020. Text Perceptron: Towards End-to-End Arbitrary-Shaped Text Spotting. In AAAI Conference on Artificial Intelligence. 11899--11907."},{"key":"e_1_3_2_2_41_1","volume-title":"Asymmetric Loss For Multi-Label Classification. In IEEE\/CVF International Conference on Computer Vision. 82--91","author":"Ridnik Tal","year":"2021","unstructured":"Tal Ridnik, Emanuel Ben Baruch, Nadav Zamir, Asaf Noy, Itamar Friedman, Matan Protter, and Lihi Zelnik-Manor. 2021. Asymmetric Loss For Multi-Label Classification. In IEEE\/CVF International Conference on Computer Vision. 82--91."},{"key":"e_1_3_2_2_42_1","volume-title":"Multi-label Adversarial Perturbations. In IEEE International Conference on Data Mining. 1242--1247","author":"Song Qingquan","year":"2018","unstructured":"Qingquan Song, Haifeng Jin, Xiao Huang, and Xia Hu. 2018. Multi-label Adversarial Perturbations. In IEEE International Conference on Data Mining. 1242--1247."},{"key":"e_1_3_2_2_43_1","volume-title":"Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses. In Annual Conference on Neural Information Processing Systems.","author":"Sriramanan Gaurang","year":"2020","unstructured":"Gaurang Sriramanan, Sravanti Addepalli, Arya Baburaj, and Venkatesh Babu R. 2020. Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses. In Annual Conference on Neural Information Processing Systems."},{"key":"e_1_3_2_2_44_1","volume-title":"International Conference on Machine Learning. 1139--1147","author":"Sutskever Ilya","unstructured":"Ilya Sutskever, James Martens, George E. Dahl, and Geoffrey E. Hinton. 2013. On the importance of initialization and momentum in deep learning. In International Conference on Machine Learning. 1139--1147."},{"key":"e_1_3_2_2_45_1","volume-title":"International Conference on Learning Representations.","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian J. Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_46_1","volume-title":"Geometry-Inspired Top-k Adversarial Perturbations. In IEEE\/CVF Winter Conference on Applications of Computer Vision. 4059--4068","author":"Tursynbek Nurislam","unstructured":"Nurislam Tursynbek, Aleksandr Petiushko, and Ivan V. Oseledets. 2022. Geometry-Inspired Top-k Adversarial Perturbations. In IEEE\/CVF Winter Conference on Applications of Computer Vision. 4059--4068."},{"key":"e_1_3_2_2_47_1","volume-title":"ACM International Conference on Multimedia. 2299--2307","author":"Vu Xuan-Son","unstructured":"Xuan-Son Vu, Duc-Trong Le, Christoffer Edlund, Lili Jiang, and Hoang D. Nguyen. 2020. Privacy-Preserving Visual Content Tagging using Graph Transformer Networks. In ACM International Conference on Multimedia. 2299--2307."},{"key":"e_1_3_2_2_48_1","volume-title":"All You Need Is Boundary: Toward Arbitrary-Shaped Text Spotting. In AAAI Conference on Artificial Intelligence. 12160--12167","author":"Wang Hao","year":"2020","unstructured":"Hao Wang, Pu Lu, Hui Zhang, Mingkun Yang, Xiang Bai, Yongchao Xu, Mengchao He, Yongpan Wang, and Wenyu Liu. 2020. All You Need Is Boundary: Toward Arbitrary-Shaped Text Spotting. In AAAI Conference on Artificial Intelligence. 12160--12167."},{"key":"e_1_3_2_2_49_1","volume-title":"Fast Online Object Tracking and Segmentation: A Unifying Approach. In IEEE Conference on Computer Vision and Pattern Recognition. 1328--1338","author":"Wang Qiang","unstructured":"Qiang Wang, Li Zhang, Luca Bertinetto, Weiming Hu, and Philip H. S. Torr. 2019. Fast Online Object Tracking and Segmentation: A Unifying Approach. In IEEE Conference on Computer Vision and Pattern Recognition. 1328--1338."},{"key":"e_1_3_2_2_50_1","volume-title":"Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 10369--10378","author":"Wang Zhibo","year":"2022","unstructured":"Zhibo Wang, Xiaowei Dong, Henry Xue, Zhifei Zhang, Weifeng Chiu, Tao Wei, and Kui Ren. 2022. Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 10369--10378."},{"key":"e_1_3_2_2_51_1","volume-title":"Reinforcement Learning Based Sparse Black-box Adversarial Attack on Video Recognition Models. In International Joint Conference on Artificial Intelligence. 3162--3168","author":"Wang Zeyuan","year":"2021","unstructured":"Zeyuan Wang, Chaofeng Sha, and Su Yang. 2021. Reinforcement Learning Based Sparse Black-box Adversarial Attack on Video Recognition Models. In International Joint Conference on Artificial Intelligence. 3162--3168."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3199970"},{"key":"e_1_3_2_2_53_1","volume-title":"A Survey on Extreme Multi-label Learning. CoRR","author":"Wei Tong","year":"2022","unstructured":"Tong Wei, Zhen Mao, Jiang-Xin Shi, Yu-Feng Li, and Min-Ling Zhang. 2022b. A Survey on Extreme Multi-label Learning. CoRR, Vol. abs\/2210.03968 (2022)."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01464"},{"key":"e_1_3_2_2_55_1","volume-title":"Exploring the Algorithm-Dependent Generalization of AUPRC Optimization with List Stability. In Annual Conference on Neural Information Processing Systems.","author":"Wen Peisong","year":"2022","unstructured":"Peisong Wen, Qianqian Xu, Zhiyong Yang, Yuan He, and Qingming Huang. 2022. Exploring the Algorithm-Dependent Generalization of AUPRC Optimization with List Stability. In Annual Conference on Neural Information Processing Systems."},{"key":"e_1_3_2_2_56_1","volume-title":"International Conference on Machine Learning. 3780--3788","author":"Wu Xi-Zhu","year":"2017","unstructured":"Xi-Zhu Wu and Zhi-Hua Zhou. 2017. A Unified View of Multi-Label Performance Measures. In International Conference on Machine Learning. 3780--3788."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548103"},{"key":"e_1_3_2_2_58_1","volume-title":"Generating Adversarial Examples with Adversarial Networks. In International Joint Conference on Artificial Intelligence. 3905--3911","author":"Xiao Chaowei","year":"2018","unstructured":"Chaowei Xiao, Bo Li, Jun-Yan Zhu, Warren He, Mingyan Liu, and Dawn Song. 2018. Generating Adversarial Examples with Adversarial Networks. In International Joint Conference on Artificial Intelligence. 3905--3911."},{"key":"e_1_3_2_2_59_1","volume-title":"International Conference on Machine Learning. 10727--10735","author":"Yang Forest","year":"2020","unstructured":"Forest Yang and Sanmi Koyejo. 2020. On the consistency of top-k surrogate losses. In International Conference on Machine Learning. 10727--10735."},{"key":"e_1_3_2_2_60_1","volume-title":"Towards Robust Rain Removal Against Adversarial Attacks: A Comprehensive Benchmark Analysis and Beyond. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 6003--6012","author":"Yu Yi","unstructured":"Yi Yu, Wenhan Yang, Yap-Peng Tan, and Alex C. Kot. 2022. Towards Robust Rain Removal Against Adversarial Attacks: A Comprehensive Benchmark Analysis and Beyond. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 6003--6012."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475627"},{"key":"e_1_3_2_2_62_1","volume-title":"Understanding Adversarial Examples From the Mutual Influence of Images and Perturbations. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 14509--14518","author":"Zhang Chaoning","year":"2020","unstructured":"Chaoning Zhang, Philipp Benz, Tooba Imtiaz, and In So Kweon. 2020. Understanding Adversarial Examples From the Mutual Influence of Images and Perturbations. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 14509--14518."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00396"},{"key":"e_1_3_2_2_64_1","volume-title":"Transformer-based Dual Relation Graph for Multi-label Image Recognition. In IEEE\/CVF International Conference on Computer Vision. 163--172","author":"Zhao Jiawei","year":"2021","unstructured":"Jiawei Zhao, Ke Yan, Yifan Zhao, Xiaowei Guo, Feiyue Huang, and Jia Li. 2021. Transformer-based Dual Relation Graph for Multi-label Image Recognition. In IEEE\/CVF International Conference on Computer Vision. 163--172."}],"event":{"name":"MM '23: The 31st ACM International Conference on Multimedia","location":"Ottawa ON Canada","acronym":"MM '23","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 31st ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581783.3611846","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3581783.3611846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:06:34Z","timestamp":1755821194000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581783.3611846"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,26]]},"references-count":64,"alternative-id":["10.1145\/3581783.3611846","10.1145\/3581783"],"URL":"https:\/\/doi.org\/10.1145\/3581783.3611846","relation":{},"subject":[],"published":{"date-parts":[[2023,10,26]]},"assertion":[{"value":"2023-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}