{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T14:29:18Z","timestamp":1769524158193,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","funder":[{"name":"National Key R&D Program of China","award":["2024YFB4709000"],"award-info":[{"award-number":["2024YFB4709000"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62402087 and 62020106013"],"award-info":[{"award-number":["62402087 and 62020106013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Sichuan Science and Technology Program","award":["2024ZHCG0188"],"award-info":[{"award-number":["2024ZHCG0188"]}]},{"DOI":"10.13039\/501100019014","name":"Chengdu Science and Technology Program","doi-asserted-by":"publisher","award":["2023-XT00-00002-GX"],"award-info":[{"award-number":["2023-XT00-00002-GX"]}],"id":[{"id":"10.13039\/501100019014","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Funds for Chinese Central Universities","award":["ZYGX2020ZB027 and Y030232063003002"],"award-info":[{"award-number":["ZYGX2020ZB027 and Y030232063003002"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["BX20230060 and 2024M760356"],"award-info":[{"award-number":["BX20230060 and 2024M760356"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,9]]},"DOI":"10.1145\/3743093.3770939","type":"proceedings-article","created":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T08:06:16Z","timestamp":1765008376000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["You Are Out of My Focus: A Defocus-Blur Backdoor Attack against Deep Learning Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-2719-3678","authenticated-orcid":false,"given":"Tao","family":"Wang","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1961-7946","authenticated-orcid":false,"given":"Hongwei","family":"Li","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4592-8094","authenticated-orcid":false,"given":"Wenbo","family":"Jiang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5391-2056","authenticated-orcid":false,"given":"Jiaming","family":"He","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5184-6637","authenticated-orcid":false,"given":"Zihan","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1200-2588","authenticated-orcid":false,"given":"Rui","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8990-436X","authenticated-orcid":false,"given":"Ji","family":"Guo","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0602-9360","authenticated-orcid":false,"given":"Jiachen","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Artificial Intelligence, Wuhan University of Technology, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2025,12,6]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Wenshu Fan Hongwei Li Wenbo Jiang Meng Hao Shui Yu and Xiao Zhang. 2024. Stealthy targeted backdoor attacks against image captioning. IEEE Transactions on Information Forensics and Security 19 (2024) 5655\u20135667.","DOI":"10.1109\/TIFS.2024.3402179"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359790"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Tianyu Gu Kang Liu Brendan Dolan-Gavitt and Siddharth Garg. 2019. Badnets: Evaluating backdooring attacks on deep neural networks. IEEE Access 7 (2019) 47230\u201347244.","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i25.34819"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Wenbo Jiang Hongwei Li Jiaming He Rui Zhang Guowen Xu Tianwei Zhang and Rongxing Lu. 2025. I2I Backdoor: Backdoor Attacks Against Image-to-Image Tasks. IEEE Transactions on Dependable and Secure Computing (2025).","DOI":"10.1109\/TDSC.2025.3603639"},{"key":"e_1_3_3_1_7_2","unstructured":"Wenbo Jiang Hongwei Li Guowen Xu Hao Ren Haomiao Yang Tianwei Zhang and Shui Yu. 2024. Rethinking the Design of Backdoor Triggers and Adversarial Perturbations: A Color Space Perspective. IEEE Transactions on Dependable and Secure Computing (2024)."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00786"},{"key":"e_1_3_3_1_9_2","unstructured":"Haoliang Li Yufei Wang Xiaofei Xie Yang Liu Shiqi Wang Renjie Wan Lap-Pui Chau and Alex\u00a0C Kot. 2020. Light can hack your face! black-box backdoor attack on face recognition systems. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2009.06996 (2020)."},{"key":"e_1_3_3_1_10_2","unstructured":"Shaofeng Li Minhui Xue Benjamin Zi\u00a0Hao Zhao Haojin Zhu and Xinpeng Zhang. 2020. Invisible backdoor attacks on deep neural networks via steganography and regularization. IEEE Transactions on Dependable and Secure Computing 18 5 (2020) 2088\u20132105."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01615"},{"key":"e_1_3_3_1_12_2","unstructured":"Yiming Li Tongqing Zhai Yong Jiang Zhifeng Li and Shu-Tao Xia. 2021. Backdoor attack in the physical world. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2104.02361 (2021)."},{"key":"e_1_3_3_1_13_2","unstructured":"Yiming Li Tongqing Zhai Baoyuan Wu Yong Jiang Zhifeng Li and Shutao Xia. 2020. Rethinking the trigger of backdoor attack. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2004.04692 (2020)."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58607-2_11"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Federico Marini and Beata Walczak. 2015. Particle swarm optimization (PSO). A tutorial. Chemometrics and Intelligent Laboratory Systems 149 (2015) 153\u2013165.","DOI":"10.1016\/j.chemolab.2015.08.020"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6871"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"e_1_3_3_1_18_2","unstructured":"Hossein Souri Liam Fowl Rama Chellappa Micah Goldblum and Tom Goldstein. 2022. Sleeper agent: Scalable hidden trigger backdoors for neural networks trained from scratch. NeurIPS 35 (2022) 19165\u201319178."},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Jiawei Su Danilo\u00a0Vasconcellos Vargas and Kouichi Sakurai. 2019. One pixel attack for fooling deep neural networks. IEEE Transactions on Evolutionary Computation 23 5 (2019) 828\u2013841.","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Zhou Wang Alan\u00a0C Bovik Hamid\u00a0R Sheikh and Eero\u00a0P Simoncelli. 2004. Image quality assessment: from error visibility to structural similarity. IEEE transactions on image processing 13 4 (2004) 600\u2013612.","DOI":"10.1109\/TIP.2003.819861"},{"key":"e_1_3_3_1_21_2","unstructured":"Zihan Wang Hongwei Li Rui Zhang Wenbo Jiang Kangjie Chen Tianwei Zhang Qingchuan Zhao and Guowen Xu. 2025. BadLingual: A Novel Lingual-Backdoor Attack against Large Language Models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2505.03501 (2025)."},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10096034"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Lin Zhang Lei Zhang Xuanqin Mou and David Zhang. 2011. FSIM: A feature similarity index for image quality assessment. IEEE transactions on Image Processing 20 8 (2011) 2378\u20132386.","DOI":"10.1109\/TIP.2011.2109730"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"}],"event":{"name":"MMAsia '25: ACM Multimedia Asia","location":"Kuala Lumpur Malaysia","acronym":"MMAsia '25","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 7th ACM International Conference on Multimedia in Asia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3743093.3770939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T08:09:51Z","timestamp":1765008591000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3743093.3770939"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,6]]},"references-count":23,"alternative-id":["10.1145\/3743093.3770939","10.1145\/3743093"],"URL":"https:\/\/doi.org\/10.1145\/3743093.3770939","relation":{},"subject":[],"published":{"date-parts":[[2025,12,6]]},"assertion":[{"value":"2025-12-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}