{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T19:27:17Z","timestamp":1765308437320,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.62441237, No.62172435"],"award-info":[{"award-number":["No.62441237, No.62172435"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.1145\/3746027.3755478","type":"proceedings-article","created":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T05:50:47Z","timestamp":1761371447000},"page":"11562-11571","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Diffusion-based Adversarial Identity Manipulation for Facial Privacy Protection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-2039-9091","authenticated-orcid":false,"given":"Liqin","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5420-571X","authenticated-orcid":false,"given":"Qianyue","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4068-1766","authenticated-orcid":false,"given":"Wei","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3225-4649","authenticated-orcid":false,"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240683"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01767"},{"volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision. 8321-8330","author":"Bhattad Anand","key":"e_1_3_2_1_3_1","unstructured":"Anand Bhattad, Min Jin Chong, Kaizhao Liang, Bo Li, and David A. Forsyth. 2019. Unrestricted Adversarial Examples via Semantic Manipulation. In Proceedings of the IEEE\/CVF International Conference on Computer Vision. 8321-8330."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3480519"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97909-0_46"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 37th International Conference on Neural Information Processing Systems. 51719-51733","author":"Chen Zhaoyu","year":"2023","unstructured":"Zhaoyu Chen, Bo Li, Shuang Wu, Kaixun Jiang, Shouhong Ding, and Wenqiang Zhang. 2023. Content-Based Unrestricted Adversarial Attack. In Proceedings of the 37th International Conference on Neural Information Processing Systems. 51719-51733."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02022"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 11th International Conference on Learning Representations.","author":"Couairon Guillaume","year":"2023","unstructured":"Guillaume Couairon, Jakob Verbeek, Holger Schwenk, and Matthieu Cord. 2023. DiffEdit: Diffusion-Based Semantic Image Editing with Mask Guidance. In Proceedings of the 11th International Conference on Learning Representations."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 18th European Conference on Computer Vision. Springer, 93-109","author":"Dai Xuelong","year":"2024","unstructured":"Xuelong Dai, Kaisheng Liang, and Bin Xiao. 2024. AdvDiff: Generating Unrestricted Adversarial Examples Using Diffusion Models. In Proceedings of the 18th European Conference on Computer Vision. Springer, 93-109."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 35th International Conference on Neural Information Processing Systems. 8780-8794","author":"Dhariwal Prafulla","year":"2021","unstructured":"Prafulla Dhariwal and Alexander Nichol. 2021. Diffusion Models Beat GANs on Image Synthesis. In Proceedings of the 35th International Conference on Neural Information Processing Systems. 8780-8794."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00966"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.01058"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems. 6629-6640","author":"Heusel Martin","year":"2017","unstructured":"Martin Heusel, Hubert Ramsauer, Thomas Unterthiner, Bernhard Nessler, and Sepp Hochreiter. 2017. GANs Trained by a Two Time-Scale Update Rule Converge to a Local Nash Equilibrium. In Proceedings of the 31st International Conference on Neural Information Processing Systems. 6629-6640."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781003278290-26"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 34th International Conference on Neural Information Processing Systems. 6840-6851","author":"Ho Jonathan","year":"2020","unstructured":"Jonathan Ho, Ajay Jain, and Pieter Abbeel. 2020. Denoising Diffusion Probabilistic Models. In Proceedings of the 34th International Conference on Neural Information Processing Systems. 6840-6851."},{"key":"e_1_3_2_1_17_1","volume-title":"Squeeze-and-Excitation Networks. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 7132-7141","author":"Hu Jie","year":"2018","unstructured":"Jie Hu, Li Shen, and Gang Sun. 2018. Squeeze-and-Excitation Networks. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 7132-7141."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01459"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01185"},{"key":"e_1_3_2_1_20_1","unstructured":"Kazuya Kakizaki and Kosuke Yoshida. 2019. Adversarial Image Translation: Unrestricted Adversarial Examples in Face Recognition Systems. arXiv:1905.03421"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01368"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 6th International Conference on Learning Representations.","author":"Karras Tero","year":"2018","unstructured":"Tero Karras, Timo Aila, Samuli Laine, and Jaakko Lehtinen. 2018. Progressive Growing of GANs for Improved Quality, Stability, and Variation. In Proceedings of the 6th International Conference on Learning Representations."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00246"},{"volume-title":"Proceedings of the 2nd International Conference on Learning Representations.","author":"Diederik","key":"e_1_3_2_1_24_1","unstructured":"Diederik P. Kingma and Max Welling. 2014. Auto-Encoding Variational Bayes. In Proceedings of the 2nd International Conference on Learning Representations."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 11th International Conference on Learning Representations.","author":"Kwon Mingi","year":"2023","unstructured":"Mingi Kwon, Jaeseok Jeong, and Youngjung Uh. 2023. Diffusion Models Already Have a Semantic Latent Space. In Proceedings of the 11th International Conference on Learning Representations."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.01.029"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3681344"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i4.28147"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 6th International Conference on Learning Representations.","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In Proceedings of the 6th International Conference on Learning Representations."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3096024"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00585"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.165"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.41"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1721355115"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0006"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/3600270.3602913"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01973"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0004"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 28th International Conference on Neural Information Processing Systems. 3483-3491","author":"Sohn Kihyuk","year":"2015","unstructured":"Kihyuk Sohn, Honglak Lee, and Xinchen Yan. 2015. Learning Structured Output Representation using Deep Conditional Generative Models. In Proceedings of the 28th International Conference on Neural Information Processing Systems. 3483-3491."},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 9th International Conference on Learning Representations.","author":"Song Jiaming","year":"2021","unstructured":"Jiaming Song, Chenlin Meng, and Stefano Ermon. 2021a. Denoising Diffusion Implicit Models. In Proceedings of the 9th International Conference on Learning Representations."},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 32nd International Conference on Neural Information Processing Systems. 8453-8463","author":"Song Yang","year":"2018","unstructured":"Yang Song, Rui Shu, Nate Kushman, and Stefano Ermon. 2018. Constructing Unrestricted Adversarial Examples with Generative Models. In Proceedings of the 32nd International Conference on Neural Information Processing Systems. 8453-8463."},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the 9th International Conference on Learning Representations.","author":"Song Yang","year":"2021","unstructured":"Yang Song, Jascha Sohl-Dickstein, Diederik P. Kingma, Abhishek Kumar, Stefano Ermon, and Ben Poole. 2021b. Score-Based Generative Modeling through Stochastic Differential Equations. In Proceedings of the 9th International Conference on Learning Representations."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02321"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 2nd International Conference on Learning Representations.","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2014. Intriguing Properties of Neural Networks. In Proceedings of the 2nd International Conference on Learning Representations."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01048"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.10.081"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01761"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIVC.2017.7984553"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179445"},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the 6th International Conference on Learning Representations.","author":"Xiao Chaowei","year":"2018","unstructured":"Chaowei Xiao, Jun-Yan Zhu, Bo Li, Warren He, Mingyan Liu, and Dawn Song. 2018. Spatially Transformed Adversarial Examples. In Proceedings of the 6th International Conference on Learning Representations."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00387"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/173"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612454"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00401"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i1.32108"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00244"},{"key":"e_1_3_2_1_62_1","volume-title":"Proceedings of the 38th Annual Conference on Neural Information Processing Systems.","author":"Zhou Ziqi","year":"2024","unstructured":"Ziqi Zhou, Yufei Song, Minghui Li, Shengshan Hu, Xianlong Wang, Leo Yu Zhang, Dezhong Yao, and Hai Jin. 2024b. DarkSAM: Fooling Segment Anything Model to Segment Nothing. In Proceedings of the 38th Annual Conference on Neural Information Processing Systems."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8803269"}],"event":{"name":"MM '25: The 33rd ACM International Conference on Multimedia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Dublin Ireland","acronym":"MM '25"},"container-title":["Proceedings of the 33rd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746027.3755478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T19:24:28Z","timestamp":1765308268000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746027.3755478"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":63,"alternative-id":["10.1145\/3746027.3755478","10.1145\/3746027"],"URL":"https:\/\/doi.org\/10.1145\/3746027.3755478","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}