{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T16:18:34Z","timestamp":1771258714964,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.1145\/3746027.3755188","type":"proceedings-article","created":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T07:37:21Z","timestamp":1761377841000},"page":"1462-1470","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["CDUPatch: Color-Driven Universal Adversarial Patch Attack for Dual-Modal Visible-Infrared Detectors"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6892-4101","authenticated-orcid":false,"given":"Jiahuan","family":"Long","sequence":"first","affiliation":[{"name":"Chinese Academy of Military Science, Beijing, China and Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5224-9834","authenticated-orcid":false,"given":"Wen","family":"Yao","sequence":"additional","affiliation":[{"name":"Chinese Academy of Military Science, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1637-2928","authenticated-orcid":false,"given":"Tingsong","family":"Jiang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Military Science, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7081-2319","authenticated-orcid":false,"given":"Jiacheng","family":"Hou","sequence":"additional","affiliation":[{"name":"Chinese Academy of Military Science, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-4900-465X","authenticated-orcid":false,"given":"Shuai","family":"Jia","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9533-332X","authenticated-orcid":false,"given":"Junqi","family":"Wu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1035-3200","authenticated-orcid":false,"given":"Xiaoya","family":"Zhang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Military Science, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4568-4277","authenticated-orcid":false,"given":"Xiaohu","family":"Zheng","sequence":"additional","affiliation":[{"name":"Chinese Academy of Military Science, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8459-2845","authenticated-orcid":false,"given":"Chao","family":"Ma","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"DJI Matrice 30T. 2025. https:\/\/enterprise.dji.com\/matrice-30."},{"key":"e_1_3_2_1_2_1","unstructured":"DJI Matrice 4T. 2025. https:\/\/enterprise.dji.com\/matrice-4-series."},{"key":"e_1_3_2_1_3_1","volume-title":"International conference on machine learning.","author":"Athalye Anish","year":"2018","unstructured":"Anish Athalye, Logan Engstrom, Andrew Ilyas, and Kevin Kwok. 2018. Synthesizing robust adversarial examples. In International conference on machine learning."},{"key":"e_1_3_2_1_4_1","volume-title":"Adversarial patch. arXiv preprint arXiv:1712.09665","author":"Brown Tom B","year":"2017","unstructured":"Tom B Brown, Dandelion Man\u00e9, Aurko Roy, Mart\u00edn Abadi, and Justin Gilmer. 2017. Adversarial patch. arXiv preprint arXiv:1712.09665 (2017)."},{"key":"e_1_3_2_1_5_1","volume-title":"Towards large-scale small object detection: Survey and benchmarks","author":"Cheng Gong","year":"2023","unstructured":"Gong Cheng, Xiang Yuan, Xiwen Yao, Kebing Yan, Qinghua Zeng, Xingxing Xie, and Junwei Han. 2023. Towards large-scale small object detection: Survey and benchmarks. IEEE Transactions on Pattern Analysis and Machine Intelligence (2023)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"e_1_3_2_1_7_1","volume-title":"Serge Belongie, Jiebo Luo, Mihai Datcu, Marcello Pelillo, et al.","author":"Ding Jian","year":"2021","unstructured":"Jian Ding, Nan Xue, Gui-Song Xia, Xiang Bai, Wen Yang, Michael Ying Yang, Serge Belongie, Jiebo Luo, Mihai Datcu, Marcello Pelillo, et al., 2021. Object detection in aerial images: A large-scale benchmark and challenges. IEEE transactions on pattern analysis and machine intelligence (2021)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"e_1_3_2_1_9_1","volume-title":"An object detection algorithm based on infrared-visible dual modal feature fusion. Infrared Physics & Technology","author":"Hou Zhiqiang","year":"2024","unstructured":"Zhiqiang Hou, Chen Yang, Ying Sun, Sugang Ma, Xiaobao Yang, and Jiulun Fan. 2024. An object detection algorithm based on infrared-visible dual modal feature fusion. Infrared Physics & Technology (2024)."},{"key":"e_1_3_2_1_10_1","volume-title":"Thermal radiation heat transfer","author":"Howell John R","unstructured":"John R Howell, M Pinar Meng\u00fc\u00e7, Kyle Daun, and Robert Siegel. 2020. Thermal radiation heat transfer. CRC press."},{"key":"e_1_3_2_1_11_1","volume-title":"Two-stage optimized unified adversarial patch for attacking visible-infrared cross-modal detectors in the physical world. Applied Soft Computing","author":"Hu Chengyin","year":"2025","unstructured":"Chengyin Hu, Weiwen Shi, Wen Yao, Tingsong Jiang, Ling Tian, and Wen Li. 2025. Two-stage optimized unified adversarial patch for attacking visible-infrared cross-modal detectors in the physical world. Applied Soft Computing (2025)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00775"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01295"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01965"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58529-7_5"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00407"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00664"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00389"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","unstructured":"Glenn Jocher. 2020. YOLOv5 by Ultralytics. doi:10.5281\/zenodo.3908559","DOI":"10.5281\/zenodo.3908559"},{"key":"e_1_3_2_1_20_1","unstructured":"Glenn Jocher Ayush Chaurasia and Jing Qiu. 2023. YOLO by Ultralytics. https:\/\/github.com\/ultralytics\/ultralytics"},{"key":"e_1_3_2_1_21_1","volume-title":"When Lighting Deceives: Exposing Vision-Language Models' Illumination Vulnerability Through Illumination Transformation Attack. arXiv preprint arXiv:2503.06903","author":"Liu Hanqing","year":"2025","unstructured":"Hanqing Liu, Shouwei Ruan, Yao Huang, Shiji Zhao, and Xingxing Wei. 2025. When Lighting Deceives: Exposing Vision-Language Models' Illumination Vulnerability Through Illumination Transformation Attack. arXiv preprint arXiv:2503.06903 (2025)."},{"key":"e_1_3_2_1_22_1","volume-title":"Dpatch: An adversarial patch attack on object detectors. arXiv preprint arXiv:1806.02299","author":"Liu Xin","year":"2018","unstructured":"Xin Liu, Huanrui Yang, Ziwei Liu, Linghao Song, Hai Li, and Yiran Chen. 2018. Dpatch: An adversarial patch attack on object detectors. arXiv preprint arXiv:1806.02299 (2018)."},{"key":"e_1_3_2_1_23_1","volume-title":"PapMOT: Exploring Adversarial Patch Attack Against Multiple Object Tracking. In European Conference on Computer Vision.","author":"Long Jiahuan","year":"2024","unstructured":"Jiahuan Long, Tingsong Jiang, Wen Yao, Shuai Jia, Weijia Zhang, Weien Zhou, Chao Ma, and Xiaoqian Chen. 2024. PapMOT: Exploring Adversarial Patch Attack Against Multiple Object Tracking. In European Conference on Computer Vision."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i6.32616"},{"key":"e_1_3_2_1_25_1","volume-title":"Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767","author":"Redmon Joseph","year":"2018","unstructured":"Joseph Redmon and Ali Farhadi. 2018. Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767 (2018)."},{"key":"e_1_3_2_1_26_1","volume-title":"European Conference on Computer Vision.","author":"Ruan Shouwei","year":"2024","unstructured":"Shouwei Ruan, Yinpeng Dong, Hanqing Liu, Yao Huang, Hang Su, and Xingxing Wei. 2024a. Omniview-tuning: Boosting viewpoint invariance of vision-language pre-training models. In European Conference on Computer Vision."},{"key":"e_1_3_2_1_27_1","volume-title":"AdvDreamer Unveils: Are Vision-Language Models Truly Ready for Real-World 3D Variations? arXiv preprint arXiv:2412.03002","author":"Ruan Shouwei","year":"2024","unstructured":"Shouwei Ruan, Hanqing Liu, Yao Huang, Xiaoqi Wang, Caixin Kang, Hang Su, Yinpeng Dong, and Xingxing Wei. 2024b. AdvDreamer Unveils: Are Vision-Language Models Truly Ready for Real-World 3D Variations? arXiv preprint arXiv:2412.03002 (2024)."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.","author":"Sharif Mahmood","unstructured":"Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, and Michael K. Reiter. 2016. Accessorize to a Crime. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3168279"},{"key":"e_1_3_2_1_30_1","volume-title":"Adversarial patch attacks against aerial imagery object detectors. Neurocomputing","author":"Tang Guijian","year":"2023","unstructured":"Guijian Tang, Tingsong Jiang, Weien Zhou, Chao Li, Wen Yao, and Yong Zhao. 2023. Adversarial patch attacks against aerial imagery object detectors. Neurocomputing (2023)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20141"},{"key":"e_1_3_2_1_33_1","volume-title":"An interactively reinforced paradigm for joint infrared-visible image fusion and saliency object detection. Information Fusion","author":"Wang Di","year":"2023","unstructured":"Di Wang, Jinyuan Liu, Risheng Liu, and Xin Fan. 2023. An interactively reinforced paradigm for joint infrared-visible image fusion and saliency object detection. Information Fusion (2023)."},{"key":"e_1_3_2_1_34_1","volume-title":"Luc Van Gool, and Zheng Wang","author":"Wei Hui","year":"2024","unstructured":"Hui Wei, Hao Tang, Xuemei Jia, Zhixiang Wang, Hanxun Yu, Zhubo Li, Shin'ichi Satoh, Luc Van Gool, and Zheng Wang. 2024. Physical adversarial attack meets computer vision: A decade survey. IEEE Transactions on Pattern Analysis and Machine Intelligence (2024)."},{"key":"e_1_3_2_1_35_1","volume-title":"Adversarial sticker: A stealthy attack method in the physical world","author":"Wei Xingxing","year":"2022","unstructured":"Xingxing Wei, Ying Guo, and Jie Yu. 2022. Adversarial sticker: A stealthy attack method in the physical world. IEEE Transactions on Pattern Analysis and Machine Intelligence (2022)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00410"},{"key":"e_1_3_2_1_37_1","volume-title":"Unified adversarial patch for visible-infrared cross-modal attacks in the physical world","author":"Wei Xingxing","year":"2023","unstructured":"Xingxing Wei, Yao Huang, Yitong Sun, and Jie Yu. 2023b. Unified adversarial patch for visible-infrared cross-modal attacks in the physical world. IEEE Transactions on Pattern Analysis and Machine Intelligence (2023)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01187"},{"key":"e_1_3_2_1_39_1","volume-title":"Gradient-based sparse voxel attacks on point cloud object detection. Pattern Recognition","author":"Wu Junqi","year":"2025","unstructured":"Junqi Wu, Wen Yao, Shuai Jia, Tingsong Jiang, Weien Zhou, Chao Ma, and Xiaoqian Chen. 2025. Gradient-based sparse voxel attacks on point cloud object detection. Pattern Recognition (2025)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-019-1211-x"},{"key":"e_1_3_2_1_41_1","volume-title":"Differential feature awareness network within antagonistic learning for infrared-visible object detection","author":"Zhang Ruiheng","year":"2023","unstructured":"Ruiheng Zhang, Lu Li, Qi Zhang, Jin Zhang, Lixin Xu, Baomin Zhang, and Binglu Wang. 2023. Differential feature awareness network within antagonistic learning for infrared-visible object detection. IEEE Transactions on Circuits and Systems for Video Technology (2023)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2024.3510781"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2024.3422377"},{"key":"e_1_3_2_1_44_1","volume-title":"Detection and tracking meet drones challenge","author":"Zhu Pengfei","year":"2021","unstructured":"Pengfei Zhu, Longyin Wen, Dawei Du, Xiao Bian, Heng Fan, Qinghua Hu, and Haibin Ling. 2021. Detection and tracking meet drones challenge. IEEE Transactions on Pattern Analysis and Machine Intelligence (2021)."},{"key":"e_1_3_2_1_45_1","volume-title":"32nd USENIX Security Symposium.","author":"Zhu Wenjun","year":"2023","unstructured":"Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, and Wenyuan Xu. 2023. {TPatch}: A triggered physical adversarial patch. In 32nd USENIX Security Symposium."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01296"}],"event":{"name":"MM '25: The 33rd ACM International Conference on Multimedia","location":"Dublin Ireland","acronym":"MM '25","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 33rd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746027.3755188","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T05:02:18Z","timestamp":1765342938000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746027.3755188"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":46,"alternative-id":["10.1145\/3746027.3755188","10.1145\/3746027"],"URL":"https:\/\/doi.org\/10.1145\/3746027.3755188","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}