{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T02:31:33Z","timestamp":1765506693453,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":77,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"U.S. Office of Naval Research Award","award":["N00014-24-1-2668"],"award-info":[{"award-number":["N00014-24-1-2668"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-2316306,CNS-2330215"],"award-info":[{"award-number":["IIS-2316306,CNS-2330215"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["R01EB293388"],"award-info":[{"award-number":["R01EB293388"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,10]]},"DOI":"10.1145\/3746252.3761408","type":"proceedings-article","created":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T00:52:37Z","timestamp":1762563157000},"page":"750-760","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Backdoor in Seconds: Unlocking Vulnerabilities in Large Pre-trained Models via Model Editing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2856-4011","authenticated-orcid":false,"given":"Dongliang","family":"Guo","sequence":"first","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8822-2884","authenticated-orcid":false,"given":"Mengxuan","family":"Hu","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0331-3403","authenticated-orcid":false,"given":"Zihan","family":"Guan","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0419-4442","authenticated-orcid":false,"given":"Junfeng","family":"Guo","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5288-2792","authenticated-orcid":false,"given":"Thomas","family":"Hartvigsen","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1205-8632","authenticated-orcid":false,"given":"Sheng","family":"Li","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International conference on artificial intelligence and statistics. PMLR, 2938-2948","author":"Bagdasaryan Eugene","year":"2020","unstructured":"Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, and Vitaly Shmatikov. 2020. How to backdoor federated learning. In International conference on artificial intelligence and statistics. PMLR, 2938-2948."},{"key":"e_1_3_2_1_2_1","unstructured":"Jiawang Bai Kuofeng Gao Shaobo Min Shu-Tao Xia Zhifeng Li and Wei Liu. 2024. BadCLIP: Trigger-Aware Prompt Learning for Backdoor Attacks on CLIP. In CVPR."},{"key":"e_1_3_2_1_3_1","volume-title":"Better plain vit baselines for imagenet-1k. arXiv preprint arXiv:2205.01580","author":"Beyer Lucas","year":"2022","unstructured":"Lucas Beyer, Xiaohua Zhai, and Alexander Kolesnikov. 2022. Better plain vit baselines for imagenet-1k. arXiv preprint arXiv:2205.01580 (2022)."},{"key":"e_1_3_2_1_4_1","volume-title":"Model reprogramming: Resource-efficient cross-domain machine learning. arXiv preprint arXiv:2202.10629","author":"Chen Pin-Yu","year":"2022","unstructured":"Pin-Yu Chen. 2022. Model reprogramming: Resource-efficient cross-domain machine learning. arXiv preprint arXiv:2202.10629 (2022)."},{"key":"e_1_3_2_1_5_1","volume-title":"Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526","author":"Chen Xinyun","year":"2017","unstructured":"Xinyun Chen, Chang Liu, Bo Li, Kimberly Lu, and Dawn Song. 2017. Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526 (2017)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00391"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.522"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01175"},{"key":"e_1_3_2_1_10_1","unstructured":"Alexey Dosovitskiy Lucas Beyer Alexander Kolesnikov Dirk Weissenborn Xiaohua Zhai Thomas Unterthiner Mostafa Dehghani Matthias Minderer Georg Heigold Sylvain Gelly et al. 2020. An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)."},{"key":"e_1_3_2_1_11_1","volume-title":"An Image is Worth 16x16 Words: Transformers for Image Recognition at Scale. ICLR","author":"Dosovitskiy Alexey","year":"2021","unstructured":"Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, Xiaohua Zhai, Thomas Unterthiner, Mostafa Dehghani, Matthias Minderer, Georg Heigold, Sylvain Gelly, Jakob Uszkoreit, and Neil Houlsby. 2021. An Image is Worth 16x16 Words: Transformers for Image Recognition at Scale. ICLR (2021)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i6.20610"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-023-01891-x"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359790"},{"key":"e_1_3_2_1_15_1","volume-title":"Witches' brew: Industrial scale data poisoning via gradient matching. arXiv preprint arXiv:2009.02276","author":"Geiping Jonas","year":"2020","unstructured":"Jonas Geiping, Liam Fowl, W Ronny Huang, Wojciech Czaja, Gavin Taylor, Michael Moeller, and Tom Goldstein. 2020. Witches' brew: Industrial scale data poisoning via gradient matching. arXiv preprint arXiv:2009.02276 (2020)."},{"key":"e_1_3_2_1_16_1","volume-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733","author":"Gu Tianyu","year":"2017","unstructured":"Tianyu Gu, Brendan Dolan-Gavitt, and Siddharth Garg. 2017. Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733 (2017)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i21.30448"},{"key":"e_1_3_2_1_18_1","volume-title":"Benign samples matter! fine-tuning on outlier benign samples severely breaks safety. arXiv preprint arXiv:2505.06843","author":"Guan Zihan","year":"2025","unstructured":"Zihan Guan, Mengxuan Hu, Ronghang Zhu, Sheng Li, and Anil Vullikanti. 2025. Benign samples matter! fine-tuning on outlier benign samples severely breaks safety. arXiv preprint arXiv:2505.06843 (2025)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3614784"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","unstructured":"Dongliang Guo Yun Fu and Sheng Li. [n.d.]. Ada-VAD: Domain Adaptable Video Anomaly Detection. 634-642. doi:10.1137\/1.9781611978032.73 arXiv:https:\/\/epubs.siam.org\/doi\/pdf\/10.1137\/1.9781611978032.73","DOI":"10.1137\/1.9781611978032.73"},{"key":"e_1_3_2_1_21_1","volume-title":"BalancEdit: Dynamically Balancing the Generality-Locality Trade-off in Multi-modal Model Editing. In International Conference on Machine Learning. https:\/\/arxiv.org\/abs\/2505","author":"Guo Dongliang","year":"2025","unstructured":"Dongliang Guo, Mengxuan Hu, Zihan Guan, Thomas Hartvigsen, and Sheng Li. 2025. BalancEdit: Dynamically Balancing the Generality-Locality Trade-off in Multi-modal Model Editing. In International Conference on Machine Learning. https:\/\/arxiv.org\/abs\/2505.01343"},{"key":"e_1_3_2_1_22_1","volume-title":"Scale-up: An efficient black-box input-level backdoor detection via analyzing scaled prediction consistency. arXiv preprint arXiv:2302.03251","author":"Guo Junfeng","year":"2023","unstructured":"Junfeng Guo, Yiming Li, Xun Chen, Hanqing Guo, Lichao Sun, and Cong Liu. 2023. Scale-up: An efficient black-box input-level backdoor detection via analyzing scaled prediction consistency. arXiv preprint arXiv:2302.03251 (2023)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548171"},{"key":"e_1_3_2_1_24_1","unstructured":"Thomas Hartvigsen Swami Sankaranarayanan Hamid Palangi Yoon Kim and Marzyeh Ghassemi. 2023. Aging with GRACE: Lifelong Model Editing with Discrete Key-Value Adaptors. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_26_1","first-page":"8068","article-title":"Handcrafted backdoors in deep neural networks","volume":"35","author":"Hong Sanghyun","year":"2022","unstructured":"Sanghyun Hong, Nicholas Carlini, and Alexey Kurakin. 2022. Handcrafted backdoors in deep neural networks. Advances in Neural Information Processing Systems, Vol. 35 (2022), 8068-8080.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_27_1","volume-title":"The Thirteenth International Conference on Learning Representations.","author":"Hu Mengxuan","year":"2025","unstructured":"Mengxuan Hu, Zihan Guan, Yi Zeng, Junfeng Guo, Zhongliang Zhou, Jielu Zhang, Ruoxi Jia, Anil Kumar Vullikanti, and Sheng Li. 2025. Mind Control through Causal Inference: Predicting Clean Images from Poisoned Data. In The Thirteenth International Conference on Learning Representations."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583348"},{"key":"e_1_3_2_1_29_1","volume-title":"International Conference on Learning Representations.","author":"Huang Zeyu","year":"2023","unstructured":"Zeyu Huang, Yikang Shen, Xiaofeng Zhang, Jie Zhou, Wenge Rong, and Zhang Xiong. 2023a. Transformer-Patcher: One Mistake worth One Neuron. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833644"},{"key":"e_1_3_2_1_31_1","unstructured":"Alex Krizhevsky Geoffrey Hinton et al. 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_2_1_32_1","volume-title":"International Conference on Machine Learning. PMLR, 12888-12900","author":"Li Junnan","year":"2022","unstructured":"Junnan Li, Dongxu Li, Caiming Xiong, and Steven Hoi. 2022. Blip: Bootstrapping language-image pre-training for unified vision-language understanding and generation. In International Conference on Machine Learning. PMLR, 12888-12900."},{"key":"e_1_3_2_1_33_1","volume-title":"Neural attention distillation: Erasing backdoor triggers from deep neural networks. arXiv preprint arXiv:2101.05930","author":"Li Yige","year":"2021","unstructured":"Yige Li, Xixiang Lyu, Nodens Koren, Lingjuan Lyu, Bo Li, and Xingjun Ma. 2021a. Neural attention distillation: Erasing backdoor triggers from deep neural networks. arXiv preprint arXiv:2101.05930 (2021)."},{"key":"e_1_3_2_1_34_1","volume-title":"Backdoor attack in the physical world. arXiv preprint arXiv:2104.02361","author":"Li Yiming","year":"2021","unstructured":"Yiming Li, Tongqing Zhai, Yong Jiang, Zhifeng Li, and Shu-Tao Xia. 2021b. Backdoor attack in the physical world. arXiv preprint arXiv:2104.02361 (2021)."},{"key":"e_1_3_2_1_35_1","first-page":"740","volume-title":"Zurich","author":"Lin Tsung-Yi","year":"2014","unstructured":"Tsung-Yi Lin, Michael Maire, Serge Belongie, James Hays, Pietro Perona, Deva Ramanan, Piotr Doll\u00e1r, and C Lawrence Zitnick. 2014. Microsoft coco: Common objects in context. In Computer Vision-ECCV 2014: 13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part V 13. Springer, 740-755."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01934"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2007.02343"},{"key":"e_1_3_2_1_40_1","volume-title":"Dbia: Data-free backdoor injection attack against transformer networks. arXiv preprint arXiv:2111.11870","author":"Lv Peizhuo","year":"2021","unstructured":"Peizhuo Lv, Hualong Ma, Jiachen Zhou, Ruigang Liang, Kai Chen, Shengzhi Zhang, and Yunfei Yang. 2021. Dbia: Data-free backdoor injection attack against transformer networks. arXiv preprint arXiv:2111.11870 (2021)."},{"key":"e_1_3_2_1_41_1","first-page":"2671","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Lv Peizhuo","year":"2023","unstructured":"Peizhuo Lv, Chang Yue, Ruigang Liang, Yunfei Yang, Shengzhi Zhang, Hualong Ma, and Kai Chen. 2023. A Data-free Backdoor Injection Approach in Neural Networks. In 32nd USENIX Security Symposium (USENIX Security 23). 2671-2688."},{"key":"e_1_3_2_1_42_1","volume-title":"European Conference on Computer Vision. Springer, 467-483","author":"Lyu Weimin","year":"2024","unstructured":"Weimin Lyu, Lu Pang, Tengfei Ma, Haibin Ling, and Chao Chen. 2024. Trojvlm: Backdoor attack against vision language models. In European Conference on Computer Vision. Springer, 467-483."},{"key":"e_1_3_2_1_43_1","volume-title":"A Backdoor Attack Scheme with Invisible Triggers Based on Model Architecture Modification. arXiv preprint arXiv:2412.16905","author":"Ma Yuan","year":"2024","unstructured":"Yuan Ma, Xu Ma, Jiankang Wei, Jinmeng Tang, Xiaoyu Zhang, Yilun Lyu, Kehao Chen, and Jingtong Huang. 2024. A Backdoor Attack Scheme with Invisible Triggers Based on Model Architecture Modification. arXiv preprint arXiv:2412.16905 (2024)."},{"key":"e_1_3_2_1_44_1","unstructured":"Kevin Meng David Bau Alex Andonian and Yonatan Belinkov. 2022a. Locating and Editing Factual Associations in GPT. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_45_1","volume-title":"Alex Andonian, Yonatan Belinkov, and David Bau.","author":"Meng Kevin","year":"2022","unstructured":"Kevin Meng, Arnab Sen Sharma, Alex Andonian, Yonatan Belinkov, and David Bau. 2022b. Mass-editing memory in a transformer. arXiv preprint arXiv:2210.07229 (2022)."},{"key":"e_1_3_2_1_46_1","volume-title":"International Conference on Learning Representations.","author":"Mitchell Eric","year":"2022","unstructured":"Eric Mitchell, Charles Lin, Antoine Bosselut, Chelsea Finn, and Christopher D Manning. 2022a. Fast model editing at scale. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_47_1","volume-title":"International Conference on Machine Learning. PMLR.","author":"Mitchell Eric","year":"2022","unstructured":"Eric Mitchell, Charles Lin, Antoine Bosselut, Christopher D Manning, and Chelsea Finn. 2022b. Memory-based model editing at scale. In International Conference on Machine Learning. PMLR."},{"key":"e_1_3_2_1_48_1","volume-title":"Wanet-imperceptible warping-based backdoor attack. arXiv preprint arXiv:2102.10369","author":"Nguyen Anh","year":"2021","unstructured":"Anh Nguyen and Anh Tran. 2021. Wanet-imperceptible warping-based backdoor attack. arXiv preprint arXiv:2102.10369 (2021)."},{"key":"e_1_3_2_1_49_1","first-page":"3454","volume-title":"Lin (Eds.)","volume":"33","author":"Nguyen Tuan Anh","year":"2020","unstructured":"Tuan Anh Nguyen and Anh Tran. 2020. Input-Aware Dynamic Backdoor Attack. In Advances in Neural Information Processing Systems, H. Larochelle, M. Ranzato, R. Hadsell, M. F. Balcan, and H. Lin (Eds.), Vol. 33. Curran Associates, Inc., 3454-3464. https:\/\/proceedings.neurips.cc\/paper\/2020\/file\/234e691320c0ad5b45ee3c96d0d7b8f8-Paper.pdf"},{"key":"e_1_3_2_1_50_1","unstructured":"Xiangyu Qi Tinghao Xie Yiming Li Saeed Mahloujifar and Prateek Mittal. 2023. Revisiting the assumption of latent separability for backdoor defenses. In The eleventh international conference on learning representations."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01299"},{"key":"e_1_3_2_1_52_1","unstructured":"Jiaxing Qiu Dongliang Guo Brynne Sullivan Teague R. Henry and Tom Hartvigsen. 2025. Instruction-based Time Series Editing. arXiv:2508.01504 [cs.LG] https:\/\/arxiv.org\/abs\/2508.01504"},{"key":"e_1_3_2_1_53_1","volume-title":"International conference on machine learning. PMLR, 8748-8763","author":"Radford Alec","year":"2021","unstructured":"Alec Radford, Jong Wook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, et al., 2021. Learning transferable visual models from natural language supervision. In International conference on machine learning. PMLR, 8748-8763."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00633"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_3_2_1_57_1","first-page":"234","volume-title":"Munich","author":"Ronneberger Olaf","year":"2015","unstructured":"Olaf Ronneberger, Philipp Fischer, and Thomas Brox. 2015. U-net: Convolutional networks for biomedical image segmentation. In Medical Image Computing and Computer-Assisted Intervention-MICCAI 2015: 18th International Conference, Munich, Germany, October 5-9, 2015, Proceedings, Part III 18. Springer, 234-241."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","unstructured":"Ali Shafahi W. Ronny Huang Mahyar Najibi Octavian Suciu Christoph Studer Tudor Dumitras and Tom Goldstein. 2018. Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks. doi:10.48550\/ARXIV.1804.00792","DOI":"10.48550\/ARXIV.1804.00792"},{"key":"e_1_3_2_1_59_1","volume-title":"Editable Neural Networks. In International Conference on Learning Representations.","author":"Sinitsin Anton","year":"2020","unstructured":"Anton Sinitsin, Vsevolod Plokhotnyuk, Dmitry Pyrkin, Sergei Popov, and Artem Babenko. 2020. Editable Neural Networks. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_60_1","first-page":"19165","article-title":"Sleeper agent: Scalable hidden trigger backdoors for neural networks trained from scratch","volume":"35","author":"Souri Hossein","year":"2022","unstructured":"Hossein Souri, Liam Fowl, Rama Chellappa, Micah Goldblum, and Tom Goldstein. 2022. Sleeper agent: Scalable hidden trigger backdoors for neural networks trained from scratch. Advances in Neural Information Processing Systems, Vol. 35 (2022), 19165-19178.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_61_1","volume-title":"Man vs. computer: Benchmarking machine learning algorithms for traffic sign recognition. Neural networks","author":"Stallkamp Johannes","year":"2012","unstructured":"Johannes Stallkamp, Marc Schlipsing, Jan Salmen, and Christian Igel. 2012. Man vs. computer: Benchmarking machine learning algorithms for traffic sign recognition. Neural networks, Vol. 32 (2012), 323-332."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403064"},{"key":"e_1_3_2_1_63_1","first-page":"10506","article-title":"Learning Robust Global Representations by Penalizing Local Predictive Power","author":"Wang Haohan","year":"2019","unstructured":"Haohan Wang, Songwei Ge, Zachary Lipton, and Eric P Xing. 2019. Learning Robust Global Representations by Penalizing Local Predictive Power. In Advances in Neural Information Processing Systems. 10506-10518.","journal-title":"Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_64_1","unstructured":"Song Wang Yaochen Zhu Haochen Liu Zaiyi Zheng Chen Chen et al. 2023. Knowledge editing for large language models: A survey. arXiv preprint arXiv:2310.16218 (2023)."},{"key":"e_1_3_2_1_65_1","unstructured":"Yizhou Wang Dongliang Guo Sheng Li Octavia Camps and Yun Fu. 2025. Unveiling the Unseen: A Comprehensive Survey on Explainable Anomaly Detection in Images and Videos. arXiv:2302.06670 [cs.LG] https:\/\/arxiv.org\/abs\/2302.06670"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00614"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02306"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354209"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00674"},{"key":"e_1_3_2_1_70_1","volume-title":"Yi Gu, Sungho Ryu, Roger Ren, Qi Luo, Aditya Gourav, I-Fan Chen, et al.","author":"Yu Yu","year":"2023","unstructured":"Yu Yu, Huck Yang, Jari Kolehmainen, Prashanth Gurunath Shivakumar, Yi Gu, Sungho Ryu, Roger Ren, Qi Luo, Aditya Gourav, I-Fan Chen, et al., 2023b. Low-rank adaptation of large language model rescoring for parameter-efficient speech recognition. (2023)."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02357"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690284"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19833-5_29"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560905.3568539"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00392"},{"key":"e_1_3_2_1_76_1","volume-title":"Panda: Prompt transfer meets knowledge distillation for efficient model adaptation. arXiv preprint arXiv:2208.10160","author":"Zhong Qihuang","year":"2022","unstructured":"Qihuang Zhong, Liang Ding, Juhua Liu, Bo Du, and Dacheng Tao. 2022. Panda: Prompt transfer meets knowledge distillation for efficient model adaptation. arXiv preprint arXiv:2208.10160 (2022)."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3657301"}],"event":{"name":"CIKM '25: The 34th ACM International Conference on Information and Knowledge Management","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Seoul Republic of Korea","acronym":"CIKM '25"},"container-title":["Proceedings of the 34th ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3746252.3761408","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746252.3761408","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746252.3761408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T02:26:56Z","timestamp":1765506416000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746252.3761408"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,10]]},"references-count":77,"alternative-id":["10.1145\/3746252.3761408","10.1145\/3746252"],"URL":"https:\/\/doi.org\/10.1145\/3746252.3761408","relation":{},"subject":[],"published":{"date-parts":[[2025,11,10]]},"assertion":[{"value":"2025-11-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}