{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T05:03:32Z","timestamp":1730783012417,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1145\/3664647.3681291","type":"proceedings-article","created":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T06:59:33Z","timestamp":1729925973000},"page":"671-680","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["DP-RAE: A Dual-Phase Merging Reversible Adversarial Example for Image Privacy Protection"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0009-0006-1853-6788","authenticated-orcid":false,"given":"Jiajie","family":"Zhu","sequence":"first","affiliation":[{"name":"School of Computer and Information Engineering, Xiamen University of Technology, Xiamen, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6298-846X","authenticated-orcid":false,"given":"Xia","family":"Du","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Xiamen University of Technology & School of Computer Science, Engineering Research Center of Machine Learning and Industry Intelligence, Sichuan University, Xiamen, Fujian, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2447-1806","authenticated-orcid":false,"given":"Jizhe","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computer Science, Engineering Research Center of Machine Learning and Industry Intelligence, Sichuan University, Chengdu, Sichuan, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1788-3746","authenticated-orcid":false,"given":"Chi-Man","family":"Pun","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, University of Macau, Macau, Macao"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9048-8887","authenticated-orcid":false,"given":"Qizhen","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Xiamen University of Technology, Xiamen, Fujian, China"}]},{"ORCID":"http:\/\/orcid.org\/0009-0005-7863-5772","authenticated-orcid":false,"given":"Xiaoyuan","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Xiamen University of Technology, Xiamen, Fujian, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Heat and blur: an effective and fast defense against adversarial examples. arXiv preprint arXiv:2003.07573","author":"Brama Haya","year":"2020","unstructured":"Haya Brama and Tal Grinshpoun. 2020. Heat and blur: an effective and fast defense against adversarial examples. arXiv preprint arXiv:2003.07573 (2020)."},{"unstructured":"Miles Brundage Shahar Avin Jack Clark Helen Toner Peter Eckersley Ben Garfinkel Allan Dafoe Paul Scharre Thomas Zeitzoff Bobby Filar et al. 2018. The malicious use of artificial intelligence: Forecasting prevention and mitigation. arXiv preprint arXiv:1802.07228 (2018).","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","volume-title":"Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. The guardian","author":"Cadwalladr Carole","year":"2018","unstructured":"Carole Cadwalladr and Emma Graham-Harrison. 2018. Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. The guardian, Vol. 17, 1 (2018), 22."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/TAI.2021.3088084"},{"key":"e_1_3_2_1_5_1","volume-title":"Keeping the bad guys out: Protecting and vaccinating deep learning with jpeg compression. arXiv preprint arXiv:1705.02900","author":"Das Nilaksh","year":"2017","unstructured":"Nilaksh Das, Madhuri Shanbhogue, Shang-Tse Chen, Fred Hohman, Li Chen, Michael E Kounavis, and Duen Horng Chau. 2017. Keeping the bad guys out: Protecting and vaccinating deep learning with jpeg compression. arXiv preprint arXiv:1705.02900 (2017)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/CVPR.2018.00957"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/3394171.3413808"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/TMM.2021.3116426"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/3394171.3413603"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/CVPR52688.2022.00301"},{"key":"e_1_3_2_1_11_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_12_1","volume-title":"International Conference on Machine Learning. PMLR, 2484--2493","author":"Guo Chuan","year":"2019","unstructured":"Chuan Guo, Jacob Gardner, Yurong You, Andrew Gordon Wilson, and Kilian Weinberger. 2019. Simple black-box adversarial attacks. In International Conference on Machine Learning. PMLR, 2484--2493."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/CVPR.2016.90"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/TCSVT.2018.2803303"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/ICCV.2019.00140"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 8469--8478","author":"Hu Jordan SK","year":"2022","unstructured":"Jordan SK Hu, Tianshu Kuai, and Steven L Waslander. 2022. Point density-aware voxels for lidar 3d object detection. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 8469--8478."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/CVPR.2017.243"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1109\/CVPR52688.2022.01826"},{"key":"e_1_3_2_1_19_1","volume-title":"Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems, Vol. 25 (2012)."},{"volume-title":"Artificial intelligence safety and security","author":"Kurakin Alexey","unstructured":"Alexey Kurakin, Ian J Goodfellow, and Samy Bengio. 2018. Adversarial examples in the physical world. In Artificial intelligence safety and security. Chapman and Hall\/CRC, 99--112.","key":"e_1_3_2_1_20_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/CVPR52688.2022.01325"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1109\/CVPR42600.2020.00130"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1109\/TIFS.2013.2261062"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1016\/j.patcog.2022.109048"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1109\/CVPR46437.2021.01166"},{"key":"e_1_3_2_1_26_1","volume-title":"Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083","author":"Madry Aleksander","year":"2017","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1109\/CVPR46437.2021.01029"},{"key":"e_1_3_2_1_28_1","first-page":"106","article-title":"Artificial intelligence: Risks to privacy and democracy","volume":"21","author":"Manheim Karl","year":"2019","unstructured":"Karl Manheim and Lyric Kaplan. 2019. Artificial intelligence: Risks to privacy and democracy. Yale JL & Tech., Vol. 21 (2019), 106.","journal-title":"Yale JL & Tech."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1109\/TIP.2019.2940533"},{"key":"e_1_3_2_1_30_1","volume-title":"Machine Learning in Metaverse Security: Current Solutions and Future Challenges. Comput. Surveys","author":"Otoum Yazan","year":"2024","unstructured":"Yazan Otoum, Navya Gottimukkala, Neeraj Kumar, and Amiya Nayak. 2024. Machine Learning in Metaverse Security: Current Solutions and Future Challenges. Comput. Surveys (2024)."},{"doi-asserted-by":"crossref","unstructured":"Olga Russakovsky Jia Deng Hao Su Jonathan Krause Sanjeev Satheesh Sean Ma Zhiheng Huang Andrej Karpathy Aditya Khosla Michael Bernstein et al. 2015. Imagenet large scale visual recognition challenge. International journal of computer vision Vol. 115 (2015) 211--252.","key":"e_1_3_2_1_31_1","DOI":"10.1007\/s11263-015-0816-y"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1109\/CVPR.2018.00474"},{"key":"e_1_3_2_1_33_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1109\/CVPR52688.2022.00859"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1145\/3503161.3548296"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1109\/CVPR.2016.308"},{"key":"e_1_3_2_1_37_1","volume-title":"Robustart: Benchmarking robustness on architecture design and training techniques. arXiv preprint arXiv:2109.05211","author":"Tang Shiyu","year":"2021","unstructured":"Shiyu Tang, Ruihao Gong, Yan Wang, Aishan Liu, Jiakai Wang, Xinyun Chen, Fengwei Yu, Xianglong Liu, Dawn Song, Alan Yuille, et al. 2021. Robustart: Benchmarking robustness on architecture design and training techniques. arXiv preprint arXiv:2109.05211 (2021)."},{"key":"e_1_3_2_1_38_1","volume-title":"Reversible data embedding using a difference expansion","author":"Tian Jun","year":"2003","unstructured":"Jun Tian. 2003. Reversible data embedding using a difference expansion. IEEE transactions on circuits and systems for video technology, Vol. 13, 8 (2003), 890--896."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1109\/CVPR46437.2021.00846"},{"key":"e_1_3_2_1_40_1","volume-title":"Image quality assessment: from error visibility to structural similarity","author":"Wang Zhou","year":"2004","unstructured":"Zhou Wang, Alan C Bovik, Hamid R Sheikh, and Eero P Simoncelli. 2004. Image quality assessment: from error visibility to structural similarity. IEEE transactions on image processing, Vol. 13, 4 (2004), 600--612."},{"key":"e_1_3_2_1_41_1","volume-title":"Lessons from GDPR for AI Policymaking. Available at SSRN 4528698","author":"Wolff Josephine","year":"2023","unstructured":"Josephine Wolff, William Lehr, and Christopher S Yoo. 2023. Lessons from GDPR for AI Policymaking. Available at SSRN 4528698 (2023)."},{"key":"e_1_3_2_1_42_1","volume-title":"Mitigating adversarial effects through randomization. arXiv preprint arXiv:1711.01991","author":"Xie Cihang","year":"2017","unstructured":"Cihang Xie, Jianyu Wang, Zhishuai Zhang, Zhou Ren, and Alan Yuille. 2017. Mitigating adversarial effects through randomization. arXiv preprint arXiv:1711.01991 (2017)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1016\/j.patcog.2023.109549"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1109\/CVPR52688.2022.01456"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1109\/CVPR52688.2022.01466"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.1109\/TCSVT.2022.3207008"},{"key":"e_1_3_2_1_47_1","volume-title":"Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression","author":"Zhang Weiming","year":"2013","unstructured":"Weiming Zhang, Xiaocheng Hu, Xiaolong Li, and Nenghai Yu. 2013. Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE transactions on image processing, Vol. 22, 7 (2013), 2775--2785."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_48_1","DOI":"10.1109\/CVPR52688.2022.01491"}],"event":{"sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"acronym":"MM '24","name":"MM '24: The 32nd ACM International Conference on Multimedia","location":"Melbourne VIC Australia"},"container-title":["Proceedings of the 32nd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664647.3681291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T04:23:37Z","timestamp":1730694217000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3681291"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":48,"alternative-id":["10.1145\/3664647.3681291","10.1145\/3664647"],"URL":"https:\/\/doi.org\/10.1145\/3664647.3681291","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]},"assertion":[{"value":"2024-10-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}