{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:15:56Z","timestamp":1775578556956,"version":"3.50.1"},"reference-count":62,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T00:00:00Z","timestamp":1702252800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2024,4,30]]},"abstract":"<jats:p>\n            Online Social Networks (OSNs) have blossomed into prevailing transmission channels for images in the modern era. Adversarial examples (AEs) deliberately designed to mislead deep neural networks (DNNs) are found to be fragile against the inevitable lossy operations conducted by OSNs. As a result, the AEs would lose their attack capabilities after being transmitted over OSNs. In this work, we aim to design a new framework for generating robust AEs that can survive the OSN transmission; namely, the AEs before and after the OSN transmission both possess strong attack capabilities. To this end, we first propose a differentiable network termed SImulated OSN (SIO) to simulate the various operations conducted by an OSN. Specifically, the SIO network consists of two modules: (1) a differentiable JPEG layer for approximating the ubiquitous JPEG compression and (2) an encoder-decoder subnetwork for mimicking the remaining operations. Based upon the SIO network, we then formulate an optimization framework to generate robust AEs by enforcing model outputs with and without passing through the SIO to be\n            <jats:italic>both<\/jats:italic>\n            misled. Extensive experiments conducted over Facebook, WeChat and QQ demonstrate that our attack methods produce more robust AEs than existing approaches, especially under small distortion constraints; the performance gain in terms of Attack Success Rate (ASR) could be more than 60%. Furthermore, we build a public dataset containing more than 10,000 pairs of AEs processed by Facebook, WeChat or QQ, facilitating future research in the robust AEs generation. The dataset and code are available at\n            <jats:ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/github.com\/csjunjun\/RobustOSNAttack.git\">https:\/\/github.com\/csjunjun\/RobustOSNAttack.git<\/jats:ext-link>\n            .\n          <\/jats:p>","DOI":"10.1145\/3632528","type":"journal-article","created":{"date-parts":[[2023,11,11]],"date-time":"2023-11-11T09:37:07Z","timestamp":1699695427000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Generating Robust Adversarial Examples against Online Social Networks (OSNs)"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1167-5727","authenticated-orcid":false,"given":"Jun","family":"Liu","sequence":"first","affiliation":[{"name":"Stake Key Laboratory of Internet of Things for Smart City, Department of Computer and Information Science, Faculty of Science and Technology, University of Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6015-2618","authenticated-orcid":false,"given":"Jiantao","family":"Zhou","sequence":"additional","affiliation":[{"name":"Stake Key Laboratory of Internet of Things for Smart City, Department of Computer and Information Science, Faculty of Science and Technology, University of Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8807-0254","authenticated-orcid":false,"given":"Haiwei","family":"Wu","sequence":"additional","affiliation":[{"name":"Stake Key Laboratory of Internet of Things for Smart City, Department of Computer and Information Science, Faculty of Science and Technology, University of Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3219-8405","authenticated-orcid":false,"given":"Weiwei","family":"Sun","sequence":"additional","affiliation":[{"name":"Alibaba Group, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2449-5277","authenticated-orcid":false,"given":"Jinyu","family":"Tian","sequence":"additional","affiliation":[{"name":"Macau University of Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,12,11]]},"reference":[{"key":"e_1_3_3_2_2","first-page":"284","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Athalye Anish","year":"2018","unstructured":"Anish Athalye, Logan Engstrom, Andrew Ilyas, and Kevin Kwok. 2018. Synthesizing robust adversarial examples. In Proc. Int. Conf. Mach. Learn.284\u2013293."},{"key":"e_1_3_3_3_2","first-page":"1","volume-title":"Proc. Int. Conf. Learn. Representat.","author":"Brendel Wieland","year":"2018","unstructured":"Wieland Brendel, Jonas Rauber, and Matthias Bethge. 2018. Decision-based adversarial attacks: Reliable attacks against black-box machine learning models. In Proc. Int. Conf. Learn. Representat.1\u201312."},{"key":"e_1_3_3_4_2","first-page":"39","volume-title":"Proc. IEEE Conf. Symp. Security Privacy.","author":"Carlini Nicholas","year":"2017","unstructured":"Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In Proc. IEEE Conf. Symp. Security Privacy.39\u201357."},{"key":"e_1_3_3_5_2","first-page":"41","volume-title":"Proc. IEEE Conf. Comput. Robot Vis.","author":"Chatterjee Bodhiswatta","year":"2019","unstructured":"Bodhiswatta Chatterjee and Charalambos Poullis. 2019. On building classification from remote sensor imagery using deep neural networks and the relation between classification and reconstruction accuracy using border localization as proxy. In Proc. IEEE Conf. Comput. Robot Vis.41\u201348."},{"key":"e_1_3_3_6_2","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/3128572.3140448","volume-title":"Proc. ACM Workshop Artif. Intell. Secur.","author":"Chen Pin-Yu","year":"2017","unstructured":"Pin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, and Cho-Jui Hsieh. 2017. ZOO: Zeroth order optimization based black-box attacks to deep neural networks without training substitute models. In Proc. ACM Workshop Artif. Intell. Secur.15\u201326."},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.2987465"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916364"},{"key":"e_1_3_3_9_2","first-page":"9185","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recogn.","author":"Dong Yinpeng","year":"2018","unstructured":"Yinpeng Dong, Fangzhou Liao, Tianyu Pang, Hang Su, Jun Zhu, Xiaolin Hu, and Jianguo Li. 2018. Boosting adversarial attacks with momentum. In Proc. IEEE Conf. Comput. Vis. Pattern Recogn.9185\u20139193."},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3045659"},{"key":"e_1_3_3_11_2","first-page":"1625","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recogn.","author":"Eykholt Kevin","year":"2018","unstructured":"Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Chaowei Xiao, Atul Prakash, Tadayoshi Kohno, and Dawn Song. 2018. Robust physical-world attacks on deep learning visual classification. In Proc. IEEE Conf. Comput. Vis. Pattern Recogn.1625\u20131634."},{"key":"e_1_3_3_12_2","first-page":"1","volume-title":"Proc. Int. Conf. Learn. Representat.","author":"Goodfellow Ian J.","year":"2015","unstructured":"Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and harnessing adversarial examples. In Proc. Int. Conf. Learn. Representat.1\u201311."},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2620152"},{"key":"e_1_3_3_14_2","first-page":"7132","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recogn.","author":"Hu Jie","year":"2018","unstructured":"Jie Hu, Li Shen, and Gang Sun. 2018. Squeeze-and-excitation networks. In Proc. IEEE Conf. Comput. Vis. Pattern Recogn.7132\u20137141."},{"key":"e_1_3_3_15_2","first-page":"1622","volume-title":"Proc. IEEE Int. Symp. on Biomed. Imag.","author":"Huang Qiaoying","year":"2019","unstructured":"Qiaoying Huang, Dong Yang, Pengxiang Wu, Hui Qu, Jingru Yi, and Dimitris Metaxas. 2019. MRI reconstruction via cascaded channel-wise attention network. In Proc. IEEE Int. Symp. on Biomed. Imag.1622\u20131626."},{"key":"e_1_3_3_16_2","volume-title":"Proc. of the AAAI Conf. on Artif. Intell.","year":"2018","unstructured":"Bo Luo, Yannan Liu, Lingxiao Wei, and Qiang Xu. 2018. Towards imperceptible and robust adversarial example attacks against neural networks. In Proc. of the AAAI Conf. on Artif. Intell., Vol. 32."},{"key":"e_1_3_3_17_2","article-title":"Binary classification from positive-confidence data","volume":"31","author":"Ishida Takashi","year":"2018","unstructured":"Takashi Ishida, Gang Niu, and Masashi Sugiyama. 2018. Binary classification from positive-confidence data. Proc. Int. Conf. Neural Inf. Process. Sys. 31 (2018).","journal-title":"Proc. Int. Conf. Neural Inf. Process. Sys."},{"key":"e_1_3_3_18_2","first-page":"6084","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recogn.","author":"Jia Xiaojun","year":"2019","unstructured":"Xiaojun Jia, Xingxing Wei, Xiaochun Cao, and Hassan Foroosh. 2019. ComDefend: An efficient image compression model to defend adversarial examples. In Proc. IEEE Conf. Comput. Vis. Pattern Recogn.6084\u20136092."},{"key":"e_1_3_3_19_2","first-page":"3688","volume-title":"Proc. Int. Conf. Comput. Vis. Workshop.","author":"Kansal Priya","year":"2019","unstructured":"Priya Kansal and Sabarinathan Devanathan. 2019. EyeNet: Attention based convolutional encoder-decoder network for eye region segmentation. In Proc. Int. Conf. Comput. Vis. Workshop.3688\u20133693."},{"key":"e_1_3_3_20_2","first-page":"1","volume-title":"Proc. Int. Conf. Learn. Representat.","author":"Kingma Diederik P.","year":"2015","unstructured":"Diederik P. Kingma and Jimmy Ba. 2015. Adam: A method for stochastic optimization. In Proc. Int. Conf. Learn. Representat.1\u201315."},{"key":"e_1_3_3_21_2","first-page":"1097","volume-title":"Proc. Int. Conf. Neural Inf. Process. Sys.","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. ImageNet classification with deep convolutional neural networks. In Proc. Int. Conf. Neural Inf. Process. Sys., Vol. 25. 1097\u20131105."},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2015.2500730"},{"key":"e_1_3_3_23_2","first-page":"860","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recogn.","author":"Liu Zihao","year":"2019","unstructured":"Zihao Liu, Qi Liu, Tao Liu, Nuo Xu, Xue Lin, Yanzhi Wang, and Wujie Wen. 2019. Feature distillation: DNN-oriented JPEG compression against adversarial examples. In Proc. IEEE Conf. Comput. Vis. Pattern Recogn.860\u2013868."},{"key":"e_1_3_3_24_2","first-page":"1953","volume-title":"Proc. ACM Int. Conf. Multimedia.","author":"Luo Jiebo","year":"2017","unstructured":"Jiebo Luo, Damian Borth, and Quanzeng You. 2017. Social multimedia sentiment analysis. In Proc. ACM Int. Conf. Multimedia.1953\u20131954."},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05358-9"},{"key":"e_1_3_3_26_2","first-page":"1","volume-title":"Proc. Int. Conf. Learn. Representat.","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards deep learning models resistant to adversarial attacks. In Proc. Int. Conf. Learn. Representat.1\u201323."},{"key":"e_1_3_3_27_2","first-page":"2574","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recogn.","author":"Moosavi-Dezfooli Seyed-Mohsen","year":"2016","unstructured":"Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, and Pascal Frossard. 2016. DeepFool: A simple and accurate method to fool deep neural networks. In Proc. IEEE Conf. Comput. Vis. Pattern Recogn.2574\u20132582."},{"key":"e_1_3_3_28_2","first-page":"262","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recogn.","author":"Naseer Muzammal","year":"2020","unstructured":"Muzammal Naseer, Salman Khan, Munawar Hayat, Fahad Shahbaz Khan, and Fatih Porikli. 2020. A self-supervised approach for adversarial robustness. In Proc. IEEE Conf. Comput. Vis. Pattern Recogn.262\u2013271."},{"key":"e_1_3_3_29_2","first-page":"1","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recogn. Workshop","author":"Nathan Sabari","year":"2019","unstructured":"Sabari Nathan and Priya Kansal. 2019. SkeletonNet: Shape pixel to skeleton pixel. In Proc. IEEE Conf. Comput. Vis. Pattern Recogn. Workshop. 1\u20135."},{"key":"e_1_3_3_30_2","volume-title":"Learning from Multiple Social Networks","author":"Nie Liqiang","year":"2022","unstructured":"Liqiang Nie, Xuemeng Song, and Tat-Seng Chua. 2022. Learning from Multiple Social Networks. Springer Nature."},{"key":"e_1_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2014.2340133"},{"key":"e_1_3_3_32_2","first-page":"2536","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recogn.","author":"Pathak Deepak","year":"2016","unstructured":"Deepak Pathak, Philipp Krahenbuhl, Jeff Donahue, Trevor Darrell, and Alexei A. Efros. 2016. Context encoders: Feature learning by inpainting. In Proc. IEEE Conf. Comput. Vis. Pattern Recogn.2536\u20132544."},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3148406"},{"key":"e_1_3_3_34_2","first-page":"234","volume-title":"Proc. Int. Conf. Med. Image Comput. Computer-Assisted Int.","author":"Ronneberger Olaf","year":"2015","unstructured":"Olaf Ronneberger, Philipp Fischer, and Thomas Brox. 2015. U-Net: Convolutional networks for biomedical image segmentation. In Proc. Int. Conf. Med. Image Comput. Computer-Assisted Int.234\u2013241."},{"key":"e_1_3_3_35_2","first-page":"4322","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recogn.","author":"Rony J\u00e9r\u00f4me","year":"2019","unstructured":"J\u00e9r\u00f4me Rony, Luiz G. Hafemann, Luiz S. Oliveira, Ismail Ben Ayed, Robert Sabourin, and Eric Granger. 2019. Decoupling direction and norm for efficient gradient-based l2 adversarial attacks and defenses. In Proc. IEEE Conf. Comput. Vis. Pattern Recogn.4322\u20134330."},{"key":"e_1_3_3_36_2","first-page":"421","volume-title":"Proc. Int. Conf. Med. Image Comput. Computer-Assisted Int.","author":"Roy Abhijit Guha","year":"2018","unstructured":"Abhijit Guha Roy, Nassir Navab, and Christian Wachinger. 2018. Concurrent spatial and channel \u2018squeeze & excitation\u2019 in fully convolutional networks. In Proc. Int. Conf. Med. Image Comput. Computer-Assisted Int.421\u2013429."},{"issue":"2","key":"e_1_3_3_37_2","first-page":"540","article-title":"Recalibrating fully convolutional networks with spatial and channel \u201csqueeze and excitation\u201d blocks","volume":"38","author":"Wachinger Abhijit Guha Roy, Nassir Navab, and Christian","year":"2018","unstructured":"Abhijit Guha Roy, Nassir Navab, and Christian Wachinger. 2018. Recalibrating fully convolutional networks with spatial and channel \u201csqueeze and excitation\u201d blocks. IEEE Trans. Med. Imag. 38, 2 (2018), 540\u2013549.","journal-title":"IEEE Trans. Med. Imag."},{"key":"e_1_3_3_38_2","first-page":"1","volume-title":"Proc. IEEE Int. Conf. Multimedia Expo.","author":"Shi Mengte","year":"2021","unstructured":"Mengte Shi, Sheng Li, Zhaoxia Yin, Xinpeng Zhang, and Zhenxing Qian. 2021. On generating JPEG adversarial images. In Proc. IEEE Int. Conf. Multimedia Expo.1\u20136."},{"key":"e_1_3_3_39_2","first-page":"1","volume-title":"Proc. Neural Inf. Process. Syst. Workshop","author":"Shin Richard","year":"2017","unstructured":"Richard Shin and Dawn Song. 2017. JPEG-resistant adversarial images. In Proc. Neural Inf. Process. Syst. Workshop. 1\u20136."},{"key":"e_1_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/2832907"},{"key":"e_1_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3210010"},{"key":"e_1_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3093794"},{"key":"e_1_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.2998476"},{"key":"e_1_3_3_44_2","first-page":"581","volume-title":"Proc. ACM Int. Conf. Multimedia.","author":"Sun Weiwei","year":"2016","unstructured":"Weiwei Sun, Jiantao Zhou, Ran Lyu, and Shuyuan Zhu. 2016. Processing-aware privacy-preserving photo sharing over online social networks. In Proc. ACM Int. Conf. Multimedia.581\u2013585."},{"key":"e_1_3_3_45_2","first-page":"1","volume-title":"Proc. Int. Conf. Learn. Representat.","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In Proc. Int. Conf. Learn. Representat.1\u201310."},{"key":"e_1_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2760627"},{"key":"e_1_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2695439"},{"key":"e_1_3_3_48_2","first-page":"954","volume-title":"Proc. Nat. Conf. Artif. Intell.","author":"Tsai Tzungyu","year":"2020","unstructured":"Tzungyu Tsai, Kaichen Yang, Tsung-Yi Ho, and Yier Jin. 2020. Robust adversarial objects against deep learning models. In Proc. Nat. Conf. Artif. Intell., Vol. 34. 954\u2013962."},{"key":"e_1_3_3_49_2","article-title":"Exploring transferable and robust adversarial perturbation generation from the perspective of network hierarchy","author":"Wang Ruikui","year":"2021","unstructured":"Ruikui Wang, Yuanfang Guo, Ruijie Yang, and Yunhong Wang. 2021. Exploring transferable and robust adversarial perturbation generation from the perspective of network hierarchy. arXiv preprint arXiv:2108.07033 (2021).","journal-title":"arXiv preprint arXiv:2108.07033"},{"key":"e_1_3_3_50_2","first-page":"81","volume-title":"Proc. ACM Int. Symp. Mobile Ad Hoc Netw. Comput.","author":"Wang Zhibo","year":"2020","unstructured":"Zhibo Wang, Hengchang Guo, Zhifei Zhang, Mengkai Song, Siyan Zheng, Qian Wang, and Ben Niu. 2020. Towards compression-resistant privacy-preserving photo sharing on social networks. In Proc. ACM Int. Symp. Mobile Ad Hoc Netw. Comput.81\u201390."},{"key":"e_1_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3144878"},{"key":"e_1_3_3_52_2","first-page":"907","volume-title":"Proc. ACM Int. Conf. Multimedia.","author":"Wu Peng","year":"2010","unstructured":"Peng Wu and Feng Tang. 2010. Improving face clustering using social context. In Proc. ACM Int. Conf. Multimedia.907\u2013910."},{"key":"e_1_3_3_53_2","volume-title":"Proc. Int. Conf. Learn. Representat.","author":"Xie Cihang","year":"2018","unstructured":"Cihang Xie, Jianyu Wang, Zhishuai Zhang, Zhou Ren, and Alan Yuille. 2018. Mitigating adversarial effects through randomization. In Proc. Int. Conf. Learn. Representat."},{"key":"e_1_3_3_54_2","first-page":"6287","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recogn.","author":"Xing Yazhou","year":"2021","unstructured":"Yazhou Xing, Zian Qian, and Qifeng Chen. 2021. Invertible image signal processing. In Proc. IEEE Conf. Comput. Vis. Pattern Recogn.6287\u20136296."},{"key":"e_1_3_3_55_2","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Xu Weilin","year":"2018","unstructured":"Weilin Xu, David Evans, and Yanjun Qi. 2018. Feature squeezing: Detecting adversarial examples in deep neural networks. In Proc. Netw. Distrib. Syst. Secur. Symp."},{"key":"e_1_3_3_56_2","first-page":"1","volume-title":"Proc. Int. Conf. Neural Inf. Process. Sys.","author":"Yatsura Maksym","year":"2021","unstructured":"Maksym Yatsura, Jan Metzen, and Matthias Hein. 2021. Meta-learning the search distribution of black-box random search based adversarial attacks. In Proc. Int. Conf. Neural Inf. Process. Sys., Vol. 34. 1\u201315."},{"key":"e_1_3_3_57_2","first-page":"1445","volume-title":"Proc. ACM Int. Conf. Multimedia.","author":"You Quanzeng","year":"2016","unstructured":"Quanzeng You. 2016. Sentiment and emotion analysis for social multimedia: Methodologies and applications. In Proc. ACM Int. Conf. Multimedia.1445\u20131449."},{"key":"e_1_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3021899"},{"key":"e_1_3_3_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3207008"},{"key":"e_1_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119566"},{"key":"e_1_3_3_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2923980"},{"key":"e_1_3_3_62_2","first-page":"1385","volume-title":"Proc. ACM Int. Conf. Multimedia.","author":"Zhao Sicheng","year":"2016","unstructured":"Sicheng Zhao, Hongxun Yao, Yue Gao, Rongrong Ji, Wenlong Xie, Xiaolei Jiang, and Tat-Seng Chua. 2016. Predicting personalized emotion perceptions of social images. In Proc. ACM Int. Conf. Multimedia.1385\u20131394."},{"key":"e_1_3_3_63_2","article-title":"Image sanitization in online social networks: A general framework for breaking robust information hiding","author":"Zhu Zhiying","year":"2022","unstructured":"Zhiying Zhu, Ping Wei, Zhenxing Qian, Sheng Li, and Xinpeng Zhang. 2022. Image sanitization in online social networks: A general framework for breaking robust information hiding. IEEE Trans. Circuits Syst. Video Technol. (2022). early access, doi:10.1109\/TCSVT.2022.3224243.","journal-title":"IEEE Trans. Circuits Syst. Video Technol."}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632528","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3632528","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:01Z","timestamp":1750178161000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632528"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,11]]},"references-count":62,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,4,30]]}},"alternative-id":["10.1145\/3632528"],"URL":"https:\/\/doi.org\/10.1145\/3632528","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,11]]},"assertion":[{"value":"2023-05-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-08","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}