{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:36:52Z","timestamp":1766443012439,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3760742","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:42:02Z","timestamp":1763854922000},"page":"4833-4835","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Poster: The Art of Deception: Crafting Chimera Images for Covert and Robust Semantic Poisoning Attacks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7497-9002","authenticated-orcid":false,"given":"Lin","family":"Li","sequence":"first","affiliation":[{"name":"Southern Cross University, Gold Coast, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2944-4647","authenticated-orcid":false,"given":"Youyang","family":"Qu","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6416-1215","authenticated-orcid":false,"given":"Jiayang","family":"Ao","sequence":"additional","affiliation":[{"name":"The University of Melbourne, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3690-0321","authenticated-orcid":false,"given":"Ming","family":"Ding","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1355-3870","authenticated-orcid":false,"given":"Chao","family":"Chen","sequence":"additional","affiliation":[{"name":"RMIT University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2189-7801","authenticated-orcid":false,"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alex Krizhevsky Geoffrey Hinton et al. 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_2_1_2_1","first-page":"11947","article-title":"Friendly noise against adversarial noise: a powerful defense against data poisoning attack","volume":"35","author":"Liu Tian Yu","year":"2022","unstructured":"Tian Yu Liu, Yu Yang, and Baharan Mirzasoleiman. 2022. Friendly noise against adversarial noise: a powerful defense against data poisoning attack. In Proceedings of Advances in Neural Information Processing Systems, Vol. 35. 11947-11959.","journal-title":"Proceedings of Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66415-2_4"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of International Conference on Machine Learning. PMLR, 8748-8763","author":"Radford Alec","year":"2021","unstructured":"Alec Radford, Jong Wook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, et al., 2021. Learning transferable visual models from natural language supervision. In Proceedings of International Conference on Machine Learning. PMLR, 8748-8763."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of International Conference on Machine Learning (ICML).","author":"Rezaei Keivan","year":"2023","unstructured":"Keivan Rezaei, Kiarash Banihashem, Atoosa Chegini, and Soheil Feizi. 2023. Run-Off Election: Improved Provable Defense against Data Poisoning Attacks. In Proceedings of International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551636"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of International Conference on Machine Learning (ICML). PMLR, 25154-25165","author":"Yang Yu","year":"2022","unstructured":"Yu Yang, Tian Yu Liu, and Baharan Mirzasoleiman. 2022. Not All Poisons are Created Equal: Robust Training against Data Poisoning. In Proceedings of International Conference on Machine Learning (ICML). PMLR, 25154-25165."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of International Conference on Machine Learning. PMLR, 39299-39313","author":"Yang Ziqing","year":"2023","unstructured":"Ziqing Yang, Xinlei He, Zheng Li, Michael Backes, Mathias Humbert, Pascal Berrang, and Yang Zhang. 2023. Data poisoning attacks against multimodal encoders. In Proceedings of International Conference on Machine Learning. PMLR, 39299-39313."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of NeurIPS 2021 Workshop Privacy in Machine Learning.","author":"Yousefpour Ashkan","year":"2021","unstructured":"Ashkan Yousefpour, Igor Shilov, Alexandre Sablayrolles, Davide Testuggine, Karthik Prasad, Mani Malek, John Nguyen, Sayan Ghosh, Akash Bharadwaj, Jessica Zhao, et al., 2021. Opacus: User-Friendly Differential Privacy Library in PyTorch. In Proceedings of NeurIPS 2021 Workshop Privacy in Machine Learning."}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3760742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:32:21Z","timestamp":1766442741000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3760742"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":10,"alternative-id":["10.1145\/3719027.3760742","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3760742","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}