{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:25:31Z","timestamp":1742970331681,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031727535"},{"type":"electronic","value":"9783031727542"}],"license":[{"start":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T00:00:00Z","timestamp":1730332800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T00:00:00Z","timestamp":1730332800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-72754-2_15","type":"book-chapter","created":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:57:07Z","timestamp":1730300227000},"page":"261-277","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Inter-Class Topology Alignment for\u00a0Efficient Black-Box Substitute Attacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6549-6989","authenticated-orcid":false,"given":"Lingzhuang","family":"Meng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7323-5896","authenticated-orcid":false,"given":"Mingwen","family":"Shao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4803-6526","authenticated-orcid":false,"given":"Yuanjian","family":"Qiao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9080-9923","authenticated-orcid":false,"given":"Wenjie","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,31]]},"reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1007\/978-3-030-58592-1_29","volume-title":"Computer Vision \u2013 ECCV 2020","author":"M Andriushchenko","year":"2020","unstructured":"Andriushchenko, M., Croce, F., Flammarion, N., Hein, M.: Square attack: a query-efficient black-box adversarial attack via random search. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12368, pp. 484\u2013501. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58592-1_29"},{"key":"15_CR2","unstructured":"Brendel, W., Rauber, J., Bethge, M.: Decision-based adversarial attacks: reliable attacks against black-box machine learning models. In: International Conference on Learning Representations. arXiv preprint arXiv:1712.04248 (2018)"},{"issue":"4","key":"15_CR3","first-page":"2188","volume":"44","author":"S Chen","year":"2022","unstructured":"Chen, S., He, Z., Sun, C., Yang, J., Huang, X.: Universal adversarial attack on attention and the resulting dataset DAmageNet. IEEE Trans. Pattern Anal. Mach. Intell. 44(4), 2188\u20132197 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"15_CR4","unstructured":"Croce, F., Hein, M.: Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In: International Conference on Machine Learning, vol.\u00a0119, pp. 2206\u20132216 (2020)"},{"key":"15_CR5","unstructured":"Goodfellow, I., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Huang, H., Chen, Z., Chen, H., Wang, Y., Zhang, K.: T-SEA: transfer-based self-ensemble attack on object detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 20514\u201320523 (2023)","DOI":"10.1109\/CVPR52729.2023.01965"},{"key":"15_CR8","unstructured":"Huang, T., You, S., Wang, F., Qian, C., Xu, C.: Knowledge distillation from a stronger teacher. In: Advances in Neural Information Processing Systems, vol.\u00a035, pp. 33716\u201333727 (2022)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Kariyappa, S., Prakash, A., Qureshi, M.K.: MAZE: data-free model stealing attack using zeroth-order gradient estimation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 13814\u201313823 (2021)","DOI":"10.1109\/CVPR46437.2021.01360"},{"key":"15_CR10","unstructured":"Krizhevsky, A.: Learning multiple layers of features from tiny images. Master\u2019s thesis, University of Tront (2009)"},{"key":"15_CR11","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S.: Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533 (2016)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Lee, B.K., Kim, J.: Mitigating adversarial vulnerability through causal parameter estimation by adversarial double machine learning. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4499\u20134509 (2023)","DOI":"10.1109\/ICCV51070.2023.00415"},{"key":"15_CR13","unstructured":"Li, L., Lian, Q., Chen, Y.C.: Adv3D: Generating 3D adversarial examples in driving scenarios with NeRF. arXiv preprint arXiv:2309.01351 (2023)"},{"key":"15_CR14","unstructured":"Liu, J., Lu, B., Xiong, M., Zhang, T., Xiong, H.: Adversarial attack with raindrops. arXiv preprint arXiv:2302.14267 (2023)"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-030-01264-9_8","volume-title":"Computer Vision \u2013 ECCV 2018","author":"N Ma","year":"2018","unstructured":"Ma, N., Zhang, X., Zheng, H.-T., Sun, J.: ShuffleNet V2: practical guidelines for efficient CNN architecture design. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) Computer Vision \u2013 ECCV 2018. LNCS, vol. 11218, pp. 122\u2013138. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01264-9_8"},{"key":"15_CR16","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2018)"},{"issue":"3","key":"15_CR17","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.eng.2019.12.012","volume":"6","author":"K Ren","year":"2020","unstructured":"Ren, K., Zheng, T., Qin, Z., Liu, X.: Adversarial attacks and defenses in deep learning. Engineering 6(3), 346\u2013360 (2020)","journal-title":"Engineering"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Robin, R., Andreas, B., Dominik, L., Patrick, E., Bj\u00f6rn, O.: High-resolution image synthesis with latent diffusion models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10674\u201310685 (2022)","DOI":"10.1109\/CVPR52688.2022.01042"},{"issue":"3","key":"15_CR19","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky, O., et al.: ImageNet large scale visual recognition challenge. Int. J. Comput. Vis. 115(3), 211\u2013252 (2015)","journal-title":"Int. J. Comput. Vis."},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Sandler, M., Howard, A., Zhu, M., Zhmoginov, A., Chen, L.C.: MobileNetV2: inverted residuals and linear bottlenecks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4510\u20134520 (2018)","DOI":"10.1109\/CVPR.2018.00474"},{"key":"15_CR21","unstructured":"Shao, M., Meng, L., Qiao, Y., Zhang, L., Zuo, W.: Data-free black-box attack based on diffusion model. arXiv preprint arXiv:2307.12872 (2023)"},{"key":"15_CR22","unstructured":"Sheng, L., Liang, J., He, R., Wang, Z., Tan, T.: AdaptGuard: defending against universal attacks for model adaptation. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 19093\u201319103 (2023)"},{"key":"15_CR23","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)"},{"issue":"5","key":"15_CR24","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","volume":"23","author":"J Su","year":"2019","unstructured":"Su, J., Vargas, D.V., Sakurai, K.: One pixel attack for fooling deep neural networks. IEEE Trans. Evol. Comput. 23(5), 828\u2013841 (2019)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Szegedy, C., et al.: Going deeper with convolutions. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp.\u00a01\u20139 (2015)","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Wang, N., Luo, Y.: Does physical adversarial example really matter to autonomous driving? Towards system-level effect of adversarial object evasion attack. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4412\u20134423 (2023)","DOI":"10.1109\/ICCV51070.2023.00407"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Wang, W., Qian, X., Fu, Y., Xue, X.: DST: dynamic substitute training for data-free black-box attack. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14361\u201314370 (2022)","DOI":"10.1109\/CVPR52688.2022.01396"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Wang, W., et al.: Delving into data: effectively substitute training for black-box attack. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4761\u20134770 (2021)","DOI":"10.1109\/CVPR46437.2021.00473"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhang, Z.: Structure invariant transformation for better adversarial transferability. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4607\u20134619 (2023)","DOI":"10.1109\/ICCV51070.2023.00425"},{"key":"15_CR30","doi-asserted-by":"publisher","unstructured":"Wang, X., et al.: Triangle attack: a query-efficient decision-based adversarial attack. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) Computer Vision, ECCV 2022. Lecture Notes in Computer Science, vol. 13665, pp. 156\u2013174. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-20065-6_10","DOI":"10.1007\/978-3-031-20065-6_10"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Wang, Z., et al.: Towards transferable targeted adversarial examples. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2023)","DOI":"10.1109\/CVPR52729.2023.01967"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Xie, S., Girshick, R., Dollar, P., Tu, Z., He, K.: Aggregated residual transformations for deep neural networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5987\u20135995 (2017)","DOI":"10.1109\/CVPR.2017.634"},{"key":"15_CR33","doi-asserted-by":"publisher","first-page":"102555","DOI":"10.1016\/j.cose.2021.102555","volume":"113","author":"M Yu","year":"2022","unstructured":"Yu, M., Sun, S.: FE-DaST: fast and effective data-free substitute training for black-box adversarial attacks. Comput. Secur. 113, 102555 (2022)","journal-title":"Comput. Secur."},{"key":"15_CR34","doi-asserted-by":"crossref","unstructured":"Zagoruyko, S., Komodakis, N.: Wide residual networks. In: Proceedings of the British Machine Vision Conference, pp. 87.1\u201387.12 (2016)","DOI":"10.5244\/C.30.87"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"Zhang, J., et al.: Towards efficient data free black-box adversarial attack. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 15094\u201315104 (2022)","DOI":"10.1109\/CVPR52688.2022.01469"},{"key":"15_CR36","doi-asserted-by":"publisher","first-page":"109009","DOI":"10.1016\/j.patcog.2022.109009","volume":"133","author":"X Zheng","year":"2023","unstructured":"Zheng, X., Fan, Y., Wu, B., Zhang, Y., Wang, J., Pan, S.: Robust physical-world attacks on face recognition. Pattern Recogn. 133, 109009 (2023)","journal-title":"Pattern Recogn."},{"key":"15_CR37","doi-asserted-by":"crossref","unstructured":"Zhou, M., Wu, J., Liu, Y., Liu, S., Zhu, C.: DaST: data-free substitute training for adversarial attacks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 234\u2013243 (2020)","DOI":"10.1109\/CVPR42600.2020.00031"},{"key":"15_CR38","doi-asserted-by":"publisher","first-page":"6487","DOI":"10.1109\/TIP.2022.3211736","volume":"31","author":"Y Zhu","year":"2022","unstructured":"Zhu, Y., et al.: Toward understanding and boosting adversarial transferability from a distribution perspective. IEEE Trans. Image Process. 31, 6487\u20136501 (2022)","journal-title":"IEEE Trans. Image Process."}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72754-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:08:17Z","timestamp":1730300897000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72754-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,31]]},"ISBN":["9783031727535","9783031727542"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72754-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,31]]},"assertion":[{"value":"31 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}