{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T19:51:58Z","timestamp":1765309918493,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","funder":[{"name":"Shandong Provincial Taishan Scholar Program, China","award":["tsqn202312133"],"award-info":[{"award-number":["tsqn202312133"]}]},{"name":"Shandong Provincial Natural Science Foundation, China","award":["ZR2022YQ61, ZR2023ZD32"],"award-info":[{"award-number":["ZR2022YQ61, ZR2023ZD32"]}]},{"name":"National Natural Science Foundation of China","award":["61772551, 62111530052, 62472158, 62102337, 62202307"],"award-info":[{"award-number":["61772551, 62111530052, 62472158, 62102337, 62202307"]}]},{"DOI":"10.13039\/501100001809","name":"Science and Technology Innovation Program of Hunan Province","doi-asserted-by":"publisher","award":["2024RC3102"],"award-info":[{"award-number":["2024RC3102"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Hunan Province, China","award":["2023JJ40174"],"award-info":[{"award-number":["2023JJ40174"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.1145\/3746027.3755227","type":"proceedings-article","created":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T07:26:38Z","timestamp":1761377198000},"page":"3884-3892","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["FFCBA: Feature-based Full-target Clean-label Backdoor Attacks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-9517-2667","authenticated-orcid":false,"given":"Yangxu","family":"Yin","sequence":"first","affiliation":[{"name":"China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5343-1440","authenticated-orcid":false,"given":"Honglong","family":"Chen","sequence":"additional","affiliation":[{"name":"China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0264-6545","authenticated-orcid":false,"given":"Yudong","family":"Gao","sequence":"additional","affiliation":[{"name":"China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6221-8142","authenticated-orcid":false,"given":"Peng","family":"Sun","sequence":"additional","affiliation":[{"name":"Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5160-5999","authenticated-orcid":false,"given":"Liantao","family":"Wu","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6979-3972","authenticated-orcid":false,"given":"Zhe","family":"Li","sequence":"additional","affiliation":[{"name":"China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5388-9080","authenticated-orcid":false,"given":"Weifeng","family":"Liu","sequence":"additional","affiliation":[{"name":"China University of Petroleum (East China), Qingdao, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the International Conference on Learning Representations.","author":"Bai Jiawang","year":"2021","unstructured":"Jiawang Bai, Baoyuan Wu, Yong Zhang, Yiming Li, Zhifeng Li, and Shu-Tao Xia. 2021. Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits. In Proceedings of the International Conference on Learning Representations."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01175"},{"key":"e_1_3_2_1_3_1","volume-title":"Marksman backdoor: Backdoor attacks with arbitrary target class. Advances in Neural Information Processing Systems","author":"Doan Khoa D","year":"2022","unstructured":"Khoa D Doan, Yingjie Lao, and Ping Li. 2022. Marksman backdoor: Backdoor attacks with arbitrary target class. Advances in Neural Information Processing Systems (2022)."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the International Conference on Machine Learning.","author":"Gao Yudong","year":"2024","unstructured":"Yudong Gao, Honglong Chen, Peng Sun, Zhe Li, Junjian Li, and Huajie Shao. 2024. Energy-based Backdoor Defense without Task-Specific Samples and Model Retraining. In Proceedings of the International Conference on Machine Learning."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359790"},{"key":"e_1_3_2_1_6_1","volume-title":"Badnets: Evaluating backdooring attacks on deep neural networks","author":"Gu Tianyu","year":"2019","unstructured":"Tianyu Gu, Kang Liu, Brendan Dolan-Gavitt, and Siddharth Garg. 2019. Badnets: Evaluating backdooring attacks on deep neural networks. IEEE Access (2019)."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the International Conference on Learning Representations.","author":"Guo Junfeng","year":"2022","unstructured":"Junfeng Guo, Ang Li, and Cong Liu. 2022. AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis. In Proceedings of the International Conference on Learning Representations."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the International Conference on Learning Representations.","author":"Guo Junfeng","year":"2023","unstructured":"Junfeng Guo, Yiming Li, Xun Chen, Hanqing Guo, Lichao Sun, and Cong Liu. 2023. SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via Analyzing Scaled Prediction Consistency. In Proceedings of the International Conference on Learning Representations."},{"key":"e_1_3_2_1_9_1","volume-title":"Leo Yu Zhang, and Yiming Li","author":"Hou Linshan","year":"2024","unstructured":"Linshan Hou, Ruili Feng, Zhongyun Hua, Wei Luo, Leo Yu Zhang, and Yiming Li. 2024. IBD-PSC: Input-level backdoor detection via parameter-oriented scaling consistency. arXiv preprint arXiv:2405.09786 (2024)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i3.28019"},{"key":"e_1_3_2_1_11_1","volume-title":"Neural tangent kernel: Convergence and generalization in neural networks. Advances in Neural Information Processing Systems","author":"Jacot Arthur","year":"2018","unstructured":"Arthur Jacot, Franck Gabriel, and Cl\u00e9ment Hongler. 2018. Neural tangent kernel: Convergence and generalization in neural networks. Advances in Neural Information Processing Systems (2018)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01615"},{"key":"e_1_3_2_1_13_1","volume-title":"Anti-backdoor learning: Training clean models on poisoned data. Advances in Neural Information Processing Systems","author":"Li Yige","year":"2021","unstructured":"Yige Li, Xixiang Lyu, Nodens Koren, Lingjuan Lyu, Bo Li, and Xingjun Ma. 2021b. Anti-backdoor learning: Training clean models on poisoned data. Advances in Neural Information Processing Systems (2021)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the International Conference on Learning Representations.","author":"Nguyen Tuan Anh","year":"2021","unstructured":"Tuan Anh Nguyen and Anh Tuan Tran. 2021. WaNet - Imperceptible Warping-based Backdoor Attack. In Proceedings of the International Conference on Learning Representations."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488902"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01299"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the International Conference on Learning Representations.","author":"Schneider Benjamin","year":"2024","unstructured":"Benjamin Schneider, Nils Lukas, and Florian Kerschbaum. 2024. Universal Backdoor Attacks. In Proceedings of the International Conference on Learning Representations."},{"key":"e_1_3_2_1_20_1","volume-title":"Poison frogs! targeted clean-label poisoning attacks on neural networks. Advances in Neural Information Processing Systems","author":"Shafahi Ali","year":"2018","unstructured":"Ali Shafahi, W Ronny Huang, Mahyar Najibi, Octavian Suciu, Christoph Studer, Tudor Dumitras, and Tom Goldstein. 2018. Poison frogs! targeted clean-label poisoning attacks on neural networks. Advances in Neural Information Processing Systems (2018)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP49359.2023.10222085"},{"key":"e_1_3_2_1_22_1","volume-title":"Label-consistent backdoor attacks. arXiv preprint arXiv:1912.02771","author":"Turner Alexander","year":"2019","unstructured":"Alexander Turner, Dimitris Tsipras, and Aleksander Madry. 2019. Label-consistent backdoor attacks. arXiv preprint arXiv:1912.02771 (2019)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3680689"},{"key":"e_1_3_2_1_25_1","volume-title":"Two advanced backdoor attacks against deep learning models","author":"Xue Mingfu","year":"2020","unstructured":"Mingfu Xue, Can He, Jian Wang, and Weiqiang Liu. 2020. One-to-N & N-to-One: Two advanced backdoor attacks against deep learning models. IEEE Transactions on Dependable and Secure Computing (2020)."},{"key":"e_1_3_2_1_26_1","volume-title":"Imperceptible and multi-channel backdoor attack. Applied Intelligence","author":"Xue Mingfu","year":"2024","unstructured":"Mingfu Xue, Shifeng Ni, Yinghao Wu, Yushu Zhang, and Weiqiang Liu. 2024. Imperceptible and multi-channel backdoor attack. Applied Intelligence (2024)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3681096"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616617"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3680766"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01177"}],"event":{"name":"MM '25: The 33rd ACM International Conference on Multimedia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Dublin Ireland","acronym":"MM '25"},"container-title":["Proceedings of the 33rd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746027.3755227","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T19:49:46Z","timestamp":1765309786000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746027.3755227"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":30,"alternative-id":["10.1145\/3746027.3755227","10.1145\/3746027"],"URL":"https:\/\/doi.org\/10.1145\/3746027.3755227","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}