{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:05:27Z","timestamp":1776114327906,"version":"3.50.1"},"publisher-location":"Cham","reference-count":60,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031197710","type":"print"},{"value":"9783031197727","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-19772-7_32","type":"book-chapter","created":{"date-parts":[[2022,10,27]],"date-time":"2022-10-27T22:09:58Z","timestamp":1666908598000},"page":"549-566","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":149,"title":["Frequency Domain Model Augmentation for\u00a0Adversarial Attack"],"prefix":"10.1007","author":[{"given":"Yuyang","family":"Long","sequence":"first","affiliation":[]},{"given":"Qilong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Boheng","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Lianli","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Xianglong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jingkuan","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,28]]},"reference":[{"key":"32_CR1","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/T-C.1974.223784","volume":"23","author":"N Ahmed","year":"1974","unstructured":"Ahmed, N., Natarajan, T.R., Rao, K.R.: Discrete cosine transform. IEEE Trans. Comput. 23, 90\u201393 (1974)","journal-title":"IEEE Trans. Comput."},{"key":"32_CR2","unstructured":"Bojarski, M., et al.: End to end learning for self-driving cars. CoRR abs\/1604.07316 (2016)"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.A.: Towards evaluating the robustness of neural networks. In: Symposium on Security and Privacy (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Dong, Y., et al.: Boosting adversarial attacks with momentum. In: CVPR (2018)","DOI":"10.1109\/CVPR.2018.00957"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Dong, Y., Pang, T., Su, H., Zhu, J.: Evading defenses to transferable adversarial examples by translation-invariant attacks. In: CVPR (2019)","DOI":"10.1109\/CVPR.2019.00444"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Duan, R., Chen, Y., Niu, D., Yang, Y., Qin, A.K., He, Y.: AdvDrop: adversarial attack to DNNS by dropping information. In: ICCV (2021)","DOI":"10.1109\/ICCV48922.2021.00741"},{"key":"32_CR7","unstructured":"Dziugaite, Karolina, G., Ghahramani, Z., Roy., D.M.: A study of the effect of jpg compression on adversarial images. CoRR abs\/1608.00853 (2016)"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Efros, A.A., Freeman, W.T.: Image quilting for texture synthesis and transfer. In: SIGGRAPH (2001)","DOI":"10.1145\/383259.383296"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Gao, L., Cheng, Y., Zhang, Q., Xu, X., Song, J.: Feature space targeted attacks by statistic alignment. In: IJCAI (2021)","DOI":"10.24963\/ijcai.2021\/93"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Gao, L., Zhang, Q., Song, J., Liu, X., Shen, H.T.: Patch-wise attack for fooling deep neural network. In: ECCV (2020)","DOI":"10.1007\/978-3-030-58604-1_19"},{"key":"32_CR11","unstructured":"Gao, L., Zhang, Q., Song, J., Shen, H.T.: Patch-wise++ perturbation for adversarial targeted attacks. CoRR abs\/2012.15503 (2020)"},{"key":"32_CR12","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: ICLR (2015)"},{"key":"32_CR13","unstructured":"Guo, C., Frank, J.S., Weinberger, K.Q.: Low frequency adversarial perturbation. In: Proceedings of the Thirty-Fifth Conference on Uncertainty in Artificial Intelligence, UAI 2019, Tel Aviv, Israel, 22\u201325 July 2019, vol. 115, pp. 1127\u20131137 (2019)"},{"key":"32_CR14","unstructured":"Guo, C., Rana, M., Ciss\u00e9, M., van der Maaten, L.: Countering adversarial images using input transformations. In: ICLR (2018)"},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: CVPR, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., van der Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: CVPR (2017)","DOI":"10.1109\/CVPR.2017.243"},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"Jia, J., Cao, X., Wang, B., Gong, N.Z.: Certified robustness for top-k predictions against adversarial perturbations via randomized smoothing. In: ICLR (2020)","DOI":"10.1145\/3366423.3380029"},{"key":"32_CR18","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial machine learning at scale. In: ICLR (2017)"},{"key":"32_CR19","doi-asserted-by":"crossref","unstructured":"Li, J., et al.: Projection & probability-driven black-box attack. In: CVPR (2020)","DOI":"10.1109\/CVPR42600.2020.00044"},{"key":"32_CR20","doi-asserted-by":"crossref","unstructured":"Li, X., et al.: QAIR: practical query-efficient black-box attacks for image retrieval. In: CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.00334"},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"Liao, F., Liang, M., Dong, Y., Pang, T., Hu, X., Zhu, J.: Defense against adversarial attacks using high-level representation guided denoiser. In: CVPR (2018)","DOI":"10.1109\/CVPR.2018.00191"},{"key":"32_CR22","unstructured":"Lin, J., Song, C., He, K., Wang, L., Hopcroft, J.E.: Nesterov accelerated gradient and scale invariance for adversarial attacks. In: ICLR (2020)"},{"key":"32_CR23","unstructured":"Liu, Y., Chen, X., Liu, C., Song, D.: Delving into transferable adversarial examples and black-box attacks. In: ICLR (2017)"},{"key":"32_CR24","doi-asserted-by":"crossref","unstructured":"Liu, Y., Cheng, Y., Gao, L., Liu, X., Zhang, Q., Song, J.: Practical evaluation of adversarial robustness via adaptive auto attack. CoRR abs\/2203.05154 (2022)","DOI":"10.1109\/CVPR52688.2022.01468"},{"key":"32_CR25","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: ICLR (2018)"},{"key":"32_CR26","doi-asserted-by":"crossref","unstructured":"Mao, X., Chen, Y., Wang, S., Su, H., He, Y., Xue, H.: Composite adversarial attacks. In: AAAI (2021)","DOI":"10.1609\/aaai.v35i10.17075"},{"key":"32_CR27","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S., Fawzi, A., Fawzi, O., Frossard, P.: Universal adversarial perturbations. In: CVPR (2017)","DOI":"10.1109\/CVPR.2017.17"},{"key":"32_CR28","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S., Fawzi, A., Frossard, P.: DeepFool: a simple and accurate method to fool deep neural networks. In: CVPR (2016)","DOI":"10.1109\/CVPR.2016.282"},{"key":"32_CR29","doi-asserted-by":"crossref","unstructured":"Naseer, M., Khan, S.H., Hayat, M., Khan, F.S., Porikli, F.: A self-supervised approach for adversarial robustness. In: CVPR (2020)","DOI":"10.1109\/CVPR42600.2020.00034"},{"key":"32_CR30","unstructured":"Naseer, M., Khan, S.H., Khan, M.H., Khan, F.S., Porikli, F.: Cross-domain transferability of adversarial perturbations. In: NeurPIS (2019)"},{"key":"32_CR31","unstructured":"Nesterov, Y.: A method for unconstrained convex minimization problem with the rate of convergence $$o(1\/k^2)$$. In: Doklady AN USSR (1983)"},{"key":"32_CR32","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P.D., Goodfellow, I.J., Jha, S., Celik, Z.B., Swami, A.: Practical black-box attacks against machine learning. In: Karri, R., Sinanoglu, O., Sadeghi, A., Yi, X. (eds.) Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ACM (2017)","DOI":"10.1145\/3052973.3053009"},{"key":"32_CR33","doi-asserted-by":"crossref","unstructured":"Rudin, L.I., Osher, S., Fatemi, E.: Nonlinear total variation based noise removal algorithms. Phys. D Nonlinear Phenom. 60, 259\u2013268 (1992)","DOI":"10.1016\/0167-2789(92)90242-F"},{"key":"32_CR34","doi-asserted-by":"crossref","unstructured":"Sallab, A.E., Abdou, M., Perot, E., Yogamani, S.K.: Deep reinforcement learning framework for autonomous driving. CoRR abs\/1704.02532 (2017)","DOI":"10.2352\/ISSN.2470-1173.2017.19.AVM-023"},{"key":"32_CR35","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-cam: Visual explanations from deep networks via gradient-based localization. In: ICCV (2017)","DOI":"10.1109\/ICCV.2017.74"},{"key":"32_CR36","doi-asserted-by":"crossref","unstructured":"Sharma, Y., Ding, G.W., Brubaker, M.A.: On the effectiveness of low frequency perturbations. In: IJCAI, pp. 3389\u20133396 (2019)","DOI":"10.24963\/ijcai.2019\/470"},{"key":"32_CR37","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Ioffe, S., Vanhoucke, V., Alemi, A.A.: Inception-v4, inception-ResNet and the impact of residual connections on learning. In: AAAI (2017)","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"32_CR38","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. In: CVPR (2016)","DOI":"10.1109\/CVPR.2016.308"},{"key":"32_CR39","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: ICLR (2014)"},{"key":"32_CR40","doi-asserted-by":"crossref","unstructured":"Taigman, Y., Yang, M., Ranzato, M., Wolf, L.: DeepFace: closing the gap to human-level performance in face verification. In: CVPR (2014)","DOI":"10.1109\/CVPR.2014.220"},{"key":"32_CR41","unstructured":"Thomas, A., Elibol, O.: Defense against adversarial attacks-3rd place (2017). https:\/\/github.com\/anlthms\/nips-2017\/blob\/master\/poster\/defense.pdf"},{"key":"32_CR42","unstructured":"Tram\u00e8r, F., Kurakin, A., Goodfellow, I.J., Boneh, D., McDaniel, P.D.: Ensemble adversarial training: attacks and defenses. In: ICLR (2018)"},{"key":"32_CR43","doi-asserted-by":"crossref","unstructured":"Wang, H., et al.: CosFace: large margin cosine loss for deep face recognition. In: CVPR (2018)","DOI":"10.1109\/CVPR.2018.00552"},{"key":"32_CR44","doi-asserted-by":"crossref","unstructured":"Wang, H., Wu, X., Huang, Z., Xing, E.P.: High-frequency component helps explain the generalization of convolutional neural networks. In: CVPR, pp. 8681\u20138691 (2020)","DOI":"10.1109\/CVPR42600.2020.00871"},{"key":"32_CR45","doi-asserted-by":"crossref","unstructured":"Wang, X., He, K.: Enhancing the transferability of adversarial attacks through variance tuning. In: CVPR, pp. 1924\u20131933 (2021)","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"32_CR46","doi-asserted-by":"crossref","unstructured":"Wang, X., He, X., Wang, J., He, K.: Admix: Enhancing the transferability of adversarial attacks. In: ICCV (2021)","DOI":"10.1109\/ICCV48922.2021.01585"},{"key":"32_CR47","doi-asserted-by":"crossref","unstructured":"Wang, Z., Guo, H., Zhang, Z., Liu, W., Qin, Z., Ren, K.: Feature importance-aware transferable adversarial attacks. In: ICCV (2021)","DOI":"10.1109\/ICCV48922.2021.00754"},{"key":"32_CR48","unstructured":"Wang, Z., Yang, Y., Shrivastava, A., Rawal, V., Ding, Z.: Towards frequency-based explanation for robust CNN. CoRR abs\/2005.03141 (2020)"},{"key":"32_CR49","unstructured":"Wu, D., Wang, Y., Xia, S., Bailey, J., Ma, X.: Skip connections matter: On the transferability of adversarial examples generated with resnets. In: ICLR (2020)"},{"key":"32_CR50","doi-asserted-by":"crossref","unstructured":"Wu, W., Su, Y., Lyu, M.R., King, I.: Improving the transferability of adversarial samples with adversarial transformations. In: CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.00891"},{"key":"32_CR51","unstructured":"Xie, C., Wang, J., Zhang, Z., Ren, Z., Yuille, A.L.: Mitigating adversarial effects through randomization. In: ICLR (2018)"},{"key":"32_CR52","doi-asserted-by":"crossref","unstructured":"Xie, C., Wu, Y., van der Maaten, L., Yuille, A.L., He, K.: Feature denoising for improving adversarial robustness. In: CVPR (2019)","DOI":"10.1109\/CVPR.2019.00059"},{"key":"32_CR53","doi-asserted-by":"crossref","unstructured":"Xie, C., et al.: Improving transferability of adversarial examples with input diversity. In: CVPR (2019)","DOI":"10.1109\/CVPR.2019.00284"},{"key":"32_CR54","unstructured":"Yin, D., Lopes, R.G., Shlens, J., Cubuk, E.D., Gilmer, J.: A Fourier perspective on model robustness in computer vision. In: NeurIPS (2019)"},{"key":"32_CR55","doi-asserted-by":"crossref","unstructured":"Zhang, J., Song, J., Gao, L., Liu, Y., Shen, H.T.: Progressive meta-learning with curriculum. IEEE Trans. Circ. Syst. Video Technol. 32, 5916 \u2013 5930 (2022)","DOI":"10.1109\/TCSVT.2022.3164190"},{"key":"32_CR56","unstructured":"Zhang, Q., Li, X., Chen, Y., Song, J., Gao, L., He, Y., Xue, H.: Beyond imagenet attack: Towards crafting adversarial examples for black-box domains. In: ICLR (2022)"},{"key":"32_CR57","unstructured":"Zhang, Q., Zhang, C., Li, C., Song, J., Gao, L., Shen, H.T.: Practical no-box adversarial attacks with training-free hybrid image transformation. CoRR abs\/2203.04607 (2022)"},{"key":"32_CR58","unstructured":"Zhang, Q., Zhu, X., Song, J., Gao, L., Shen, H.T.: Staircase sign method for boosting adversarial attacks. CoRR abs\/2104.09722 (2021)"},{"key":"32_CR59","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Liu, Z., Larson, M.A.: Towards large yet imperceptible adversarial image perturbations with perceptual color distance. In: CVPR (2020)","DOI":"10.1109\/CVPR42600.2020.00112"},{"key":"32_CR60","doi-asserted-by":"crossref","unstructured":"Zou, J., Pan, Z., Qiu, J., Liu, X., Rui, T., Li, W.: Improving the transferability of adversarial examples with resized-diverse-inputs, diversity-ensemble and region fitting. In: ECCV (2020)","DOI":"10.1007\/978-3-030-58542-6_34"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-19772-7_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:56:20Z","timestamp":1710262580000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-19772-7_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031197710","9783031197727"],"references-count":60,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-19772-7_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"28 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tel Aviv","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Israel","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2022.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5804","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1645","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.21","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.91","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}