{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T13:05:15Z","timestamp":1773493515239,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.1145\/3746027.3761985","type":"proceedings-article","created":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T07:26:51Z","timestamp":1761377211000},"page":"13725-13729","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Unified Framework for Stealthy Adversarial Generation via Latent Optimization and Transferability Enhancement"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-9004-9271","authenticated-orcid":false,"given":"Gaozheng","family":"Pei","sequence":"first","affiliation":[{"name":"EECE, UCAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4178-0907","authenticated-orcid":false,"given":"Ke","family":"Ma","sequence":"additional","affiliation":[{"name":"EECE, UCAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9337-9327","authenticated-orcid":false,"given":"Dongpeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"EECE, UCAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7730-9929","authenticated-orcid":false,"given":"Chengzhi","family":"Sun","sequence":"additional","affiliation":[{"name":"EECE, UCAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3512-7277","authenticated-orcid":false,"given":"Qianqian","family":"Xu","sequence":"additional","affiliation":[{"name":"IIP, ICT, CAS, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8680-0278","authenticated-orcid":false,"given":"Qingming","family":"Huang","sequence":"additional","affiliation":[{"name":"SCST, UCAS IIP, ICT, CAS BDKM, CAS, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3480519"},{"key":"e_1_3_2_1_3_1","volume-title":"International Conference on Learning Representations.","author":"Couairon Guillaume","year":"2023","unstructured":"Guillaume Couairon, Jakob Verbeek, Holger Schwenk, and Matthieu Cord. 2023. DiffEdit: Diffusion-based semantic image editing with mask guidance. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Machine Learning. 2206-2216","author":"Croce Francesco","year":"2020","unstructured":"Francesco Croce and Matthias Hein. 2020. Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In International Conference on Machine Learning. 2206-2216."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the European Conference on Computer Vision. 93-109","author":"Dai Xuelong","year":"2024","unstructured":"Xuelong Dai, Kaisheng Liang, and Bin Xiao. 2024. Advdiff: Generating unrestricted adversarial examples using diffusion models. In Proceedings of the European Conference on Computer Vision. 93-109."},{"key":"e_1_3_2_1_6_1","volume-title":"Diffusion models beat gans on image synthesis. Advances in Neural Information Processing Systems","author":"Dhariwal Prafulla","year":"2021","unstructured":"Prafulla Dhariwal and Alexander Nichol. 2021. Diffusion models beat gans on image synthesis. Advances in Neural Information Processing Systems (2021), 8780-8794."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00444"},{"key":"e_1_3_2_1_10_1","volume-title":"International Conference on Machine Learning. 12606 - 12633","author":"Esser Patrick","year":"2024","unstructured":"Patrick Esser, Sumith Kulal, Andreas Blattmann, Rahim Entezari, Jonas M\u00fcller, Harry Saini, Yam Levi, Dominik Lorenz, Axel Sauer, Frederic Boesel, et al., 2024. Scaling rectified flow transformers for high-resolution image synthesis. In International Conference on Machine Learning. 12606 - 12633."},{"key":"e_1_3_2_1_11_1","volume-title":"Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations.","author":"Goodfellow Ian","year":"2015","unstructured":"Ian Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_12_1","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume":"33","author":"Ho Jonathan","year":"2020","unstructured":"Jonathan Ho, Ajay Jain, and Pieter Abbeel. 2020. Denoising diffusion probabilistic models. Advances in Neural Information Processing Systems, Vol. 33 (2020), 6840-6851.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_13_1","volume-title":"Classifier-Free Diffusion Guidance. In NeurIPS 2021 Workshop on Deep Generative Models and Downstream Applications.","author":"Ho Jonathan","unstructured":"Jonathan Ho and Tim Salimans. [n.d.]. Classifier-Free Diffusion Guidance. In NeurIPS 2021 Workshop on Deep Generative Models and Downstream Applications."},{"key":"e_1_3_2_1_14_1","first-page":"52323","article-title":"AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial Attacks","volume":"37","author":"Li Jin","year":"2024","unstructured":"Jin Li, Ziqiang He, Anwei Luo, Jian-Fang Hu, Z Jane Wang, and Xiangui Kang. 2024. AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial Attacks. Advances in Neural Information Processing Systems, Vol. 37 (2024), 52323-52353.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_15_1","first-page":"32900","article-title":"Improving adversarial transferability via intermediate-level perturbation decay","volume":"36","author":"Li Qizhang","year":"2023","unstructured":"Qizhang Li, Yiwen Guo, Wangmeng Zuo, and Hao Chen. 2023. Improving adversarial transferability via intermediate-level perturbation decay. Advances in Neural Information Processing Systems, Vol. 36 (2023), 32900-32912.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_16_1","volume-title":"Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks. In International Conference on Learning Representations.","author":"Lin Jiadong","year":"2020","unstructured":"Jiadong Lin, Chuanbiao Song, Kun He, Liwei Wang, and John E Hopcroft. 2020. Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_17_1","volume-title":"International Conference on Learning Representations.","author":"Liu Yanpei","year":"2017","unstructured":"Yanpei Liu, Xinyun Chen, Chang Liu, and Dawn Song. 2017. Delving into Transferable Adversarial Examples and Black-box Attacks. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3681110"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Yang Liu Qianqian Xu Peisong Wen Siran Dai and Qingming Huang. 2025. When the Future Becomes the Past: Taming Temporal Correspondence for Self-supervised Video Representation Learning. arXiv:2503.15096.","DOI":"10.1109\/CVPR52734.2025.02238"},{"key":"e_1_3_2_1_20_1","volume-title":"International Conference on Learning Representations.","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01029"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.01.005"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00585"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i1.32048"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2023.3328283"},{"key":"e_1_3_2_1_27_1","unstructured":"Chunlin Qiu Yiheng Duan Lingchen Zhao and Qian Wang. 2024. Enhancing Adversarial Transferability Through Neighborhood Conditional Sampling. arXiv:2405.16181."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_3_2_1_29_1","volume-title":"Denoising Diffusion Implicit Models. In International Conference on Learning Representations.","author":"Song Jiaming","year":"2020","unstructured":"Jiaming Song, Chenlin Meng, and Stefano Ermon. 2020. Denoising Diffusion Implicit Models. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_30_1","volume-title":"International Conference on Learning Representations.","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01397"},{"key":"e_1_3_2_1_33_1","volume-title":"Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets. In International Conference on Learning Representations.","author":"Wu Dongxian","year":"2020","unstructured":"Dongxian Wu, Yisen Wang, Shu-Tao Xia, James Bailey, and Xingjun Ma. 2020a. Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_34_1","volume-title":"Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets. In International Conference on Learning Representations.","author":"Wu Dongxian","year":"2020","unstructured":"Dongxian Wu, Yisen Wang, Shu-Tao Xia, James Bailey, and Xingjun Ma. 2020b. Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00284"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01456"},{"key":"e_1_3_2_1_37_1","first-page":"2894","article-title":"Diffusion-based adversarial sample generation for improved stealthiness and controllability","volume":"36","author":"Xue Haotian","year":"2023","unstructured":"Haotian Xue, Alexandre Araujo, Bin Hu, and Yongxin Chen. 2023. Diffusion-based adversarial sample generation for improved stealthiness and controllability. Advances in Neural Information Processing Systems, Vol. 36 (2023), 2894-2921.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01264-9_28"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3681535"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3211736"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2023.3238524"}],"event":{"name":"MM '25: The 33rd ACM International Conference on Multimedia","location":"Dublin Ireland","acronym":"MM '25","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 33rd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746027.3761985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T04:06:54Z","timestamp":1765339614000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746027.3761985"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":41,"alternative-id":["10.1145\/3746027.3761985","10.1145\/3746027"],"URL":"https:\/\/doi.org\/10.1145\/3746027.3761985","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}