{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:42:38Z","timestamp":1772908958307,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T00:00:00Z","timestamp":1733443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,6]]},"DOI":"10.1145\/3709026.3709101","type":"proceedings-article","created":{"date-parts":[[2025,2,15]],"date-time":"2025-02-15T10:05:41Z","timestamp":1739613941000},"page":"147-152","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Diffusion Model-Based Adaptive Generation of Adversarial Perturbations against Deepfake"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-7595-5420","authenticated-orcid":false,"given":"Haofan","family":"He","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Tongji University, ShangHai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9236-3608","authenticated-orcid":false,"given":"Wei","family":"Duan","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Tongji University, ShangHai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3335-5973","authenticated-orcid":false,"given":"Haihang","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Tongji University, ShangHai, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,15]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"Jianqi Chen Hao Chen Keyan Chen Yilan Zhang Zhengxia Zou and Zhenwei Shi. 2024. Diffusion models for imperceptible and transferable adversarial attack. IEEE Transactions on Pattern Analysis and Machine Intelligence (2024)."},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00421"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00916"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00821"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Zhenliang He Wangmeng Zuo Meina Kan Shiguang Shan and Xilin Chen. 2019. Attgan: Facial attribute editing by only changing what you want. IEEE transactions on image processing 28 11 (2019) 5464\u20135478.","DOI":"10.1109\/TIP.2019.2916751"},{"key":"e_1_3_3_1_7_2","unstructured":"Jonathan Ho Ajay Jain and Pieter Abbeel. 2020. Denoising diffusion probabilistic models. Advances in Neural Information Processing Systems 33 (2020) 6840\u20136851."},{"key":"e_1_3_3_1_8_2","unstructured":"Jonathan Ho and Tim Salimans. 2022. Classifier-free diffusion guidance. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2207.12598 (2022)."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16254"},{"key":"e_1_3_3_1_10_2","unstructured":"Tero Karras. 2017. Progressive Growing of GANs for Improved Quality Stability and Variation. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1710.10196 (2017)."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00853"},{"key":"e_1_3_3_1_12_2","unstructured":"Jiang Liu Chun\u00a0Pong Lau and Rama Chellappa. 2023. Diffprotect: Generate adversarial examples with diffusion models for facial privacy protection. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2305.13625 (2023)."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Zuomin Qu Zuping Xi Wei Lu Xiangyang Luo Qian Wang and Bin Li. 2024. DF-RAP: A Robust Adversarial Perturbation for Defending against Deepfakes in Real-world Social Network Scenarios. IEEE Transactions on Information Forensics and Security (2024) 3943\u20133957.","DOI":"10.1109\/TIFS.2024.3372803"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_3_3_1_16_2","unstructured":"Jiaming Song Chenlin Meng and Stefano Ermon. 2020. Denoising Diffusion Implicit Models. arXiv:https:\/\/arXiv.org\/abs\/2010.02502 (October 2020). https:\/\/arxiv.org\/abs\/2010.02502"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Hui Sun Siman Wu and Lijun Ma. 2024. Adversarial attacks on GAN-based image fusion. Information Fusion 108 (2024) 102389.","DOI":"10.1016\/j.inffus.2024.102389"},{"key":"e_1_3_3_1_18_2","unstructured":"Patrick von Platen Suraj Patil Anton Lozhkov Pedro Cuenca Nathan Lambert Kashif Rasul Mishig Davaadorj Dhruv Nair Sayak Paul William Berman Yiyi Xu Steven Liu and Thomas Wolf. 2022. Diffusers: State-of-the-art diffusion models. https:\/\/github.com\/huggingface\/diffusers."},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01450"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"}],"event":{"name":"CSAI 2024: 2024 8th International Conference on Computer Science and Artificial Intelligence (CSAI)","location":"Beijing China","acronym":"CSAI 2024"},"container-title":["Proceedings of the 2024 8th International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3709026.3709101","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3709026.3709101","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:31Z","timestamp":1750295851000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3709026.3709101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,6]]},"references-count":19,"alternative-id":["10.1145\/3709026.3709101","10.1145\/3709026"],"URL":"https:\/\/doi.org\/10.1145\/3709026.3709101","relation":{},"subject":[],"published":{"date-parts":[[2024,12,6]]},"assertion":[{"value":"2025-02-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}