{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:52:43Z","timestamp":1764550363902,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","funder":[{"DOI":"10.13039\/100017052","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62371350,62171326,62202340"],"award-info":[{"award-number":["62371350,62171326,62202340"]}],"id":[{"id":"10.13039\/100017052","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2042025kf0054"],"award-info":[{"award-number":["2042025kf0054"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003819","name":"Natural Science Foundation of Hubei Province","doi-asserted-by":"publisher","award":["2025AFB455"],"award-info":[{"award-number":["2025AFB455"]}],"id":[{"id":"10.13039\/501100003819","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Science and Technology Research Project of Xinjiang Production and Construction Corps in 2025"},{"name":"Kunshan Municipal Government Research Funding, Seed Fund for Sino Foreign Joint Research Platform between Wuhan University and Duke Kunshan University"},{"name":"Alar City Science and Technology Plan Project","award":["2024ZB02"],"award-info":[{"award-number":["2024ZB02"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.1145\/3746265.3759661","type":"proceedings-article","created":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:20:29Z","timestamp":1759962029000},"page":"73-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["MGGA: Universal Perturbations against Deepfake via Multiple Model-based Gradient-Guided Feature Layer Attack"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-5632-4986","authenticated-orcid":false,"given":"Zhi","family":"Cao","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9796-488X","authenticated-orcid":false,"given":"Zhongyuan","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Wuhan University, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2842-5137","authenticated-orcid":false,"given":"Run","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3001-7957","authenticated-orcid":false,"given":"Yuhong","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Wuhan University, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7687-3671","authenticated-orcid":false,"given":"Feng","family":"Tian","sequence":"additional","affiliation":[{"name":"Division of Natural and Applied Sciences, Duke Kunshan University, Kunshan, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9953-3543","authenticated-orcid":false,"given":"Gang","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Tarim University, Alar, Xinjiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9447-7146","authenticated-orcid":false,"given":"Atsushi","family":"Suzuki","sequence":"additional","affiliation":[{"name":"Department of Mathematics, The University of Hong Kong, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00019"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2309.11321"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00916"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/3524938.3525242"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1412.6572"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT56998.2023.10306417"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2916751"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.18034\/ajase.v8i1.9"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/3495724.3496298"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1704.04861"},{"key":"e_1_3_2_2_14_1","volume-title":"Workshop on Faces in'Real-Life'Images: Detection, Alignment, and Recognition.","author":"Huang Gary B","year":"2008","unstructured":"Gary B Huang, Marwan Mattar, Tamara Berg, and Eric Learned-Miller. 2008. Labeled faces in the wild: A database forstudying face recognition in unconstrained environments. In Workshop on Faces in'Real-Life'Images: Detection, Alignment, and Recognition."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19982"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16254"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00589"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01185"},{"key":"e_1_3_2_2_19_1","first-page":"125","article-title":"Adversarial examples are not bugs, they are features. Curran Associates Inc., Red Hook","author":"Ilyas Andrew","year":"2019","unstructured":"Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Logan Engstrom, Brandon Tran, and Aleksander M\u0105dry. 2019. Adversarial examples are not bugs, they are features. Curran Associates Inc., Red Hook, NY, USA, 125-136.","journal-title":"NY, USA"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00407"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01720"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00853"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2022.11.031"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"e_1_3_2_2_27_1","volume-title":"Stat","volume":"1050","author":"Madry Aleksander","year":"2017","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. Stat, Vol. 1050, 9 (2017)."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58571-6_39"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-72920-1_7"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1811.09020"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01249-6_50"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413707"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66823-5_14"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1312.6199"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3105725"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3653457"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01270-0_43"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2206.00477"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01585"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00754"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00297"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW50321.2020.9096939"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2662206"},{"key":"e_1_3_2_2_45_1","volume-title":"Proceedings of the 36th International Conference on Neural Information Processing Systems","author":"Zhao Min","year":"2024","unstructured":"Min Zhao, Fan Bao, Chongxuan Li, and Jun Zhu. 2024. EGSDE: unpaired image-to-image translation via energy-guided stochastic differential equations. In Proceedings of the 36th International Conference on Neural Information Processing Systems (New Orleans, LA, USA) (NIPS '22). Curran Associates Inc., Red Hook, NY, USA, Article 261, 3609-3623 pages."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01264-9_28"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"}],"event":{"name":"MM '25: The 33rd ACM International Conference on Multimedia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Dublin Ireland","acronym":"MM '25"},"container-title":["Proceedings of the 1st on Deepfake Forensics Workshop: Detection, Attribution, Recognition, and Adversarial Challenges in the Era of AI-Generated Media"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746265.3759661","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:50:51Z","timestamp":1764550251000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746265.3759661"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":47,"alternative-id":["10.1145\/3746265.3759661","10.1145\/3746265"],"URL":"https:\/\/doi.org\/10.1145\/3746265.3759661","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}