{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:08:59Z","timestamp":1743041339337,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031783111"},{"type":"electronic","value":"9783031783128"}],"license":[{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78312-8_19","type":"book-chapter","created":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T12:38:21Z","timestamp":1733229501000},"page":"285-302","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Combining Frequency-Based Smoothing and Salient Masking for Performant and Imperceptible Adversarial Samples"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7978-1281","authenticated-orcid":false,"given":"Amon","family":"Soares de Souza","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6200-7553","authenticated-orcid":false,"given":"Andreas","family":"Mei\u00dfner","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8180-5606","authenticated-orcid":false,"given":"Michaela","family":"Geierhos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,4]]},"reference":[{"key":"19_CR1","doi-asserted-by":"publisher","unstructured":"Carlini, N., Wagner, D.A.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017. pp. 39\u201357. IEEE Computer Society (2017). https:\/\/doi.org\/10.1109\/SP.2017.49","DOI":"10.1109\/SP.2017.49"},{"key":"19_CR2","unstructured":"Cheng, S., Dong, Y., Pang, T., Su, H., Zhu, J.: Improving black-box adversarial attacks with a transfer-based prior. In: Wallach, H.M., Larochelle, H., Beygelzimer, A., d\u2019Alch\u00e9-Buc, F., Fox, E.B., Garnett, R. (eds.) Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada. pp. 10932\u201310942 (2019)"},{"key":"19_CR3","doi-asserted-by":"publisher","unstructured":"Croce, F., Hein, M.: Sparse and imperceivable adversarial attacks. In: 2019 IEEE\/CVF International Conference on Computer Vision, ICCV 2019, Seoul, Korea (South), October 27 - November 2, 2019. pp. 4723\u20134731. IEEE (2019). https:\/\/doi.org\/10.1109\/ICCV.2019.00482","DOI":"10.1109\/ICCV.2019.00482"},{"key":"19_CR4","unstructured":"Domanski, M., Rakowski, K.: Color transformations for lossless image compression. In: 10th European Signal Processing Conference, EUSIPCO 2000, Tampere, Finland, September 4-8, 2000. pp.\u00a01\u20134. IEEE (2000)"},{"key":"19_CR5","doi-asserted-by":"publisher","unstructured":"Fezza, S.A., Bakhti, Y., Hamidouche, W., D\u00e9forges, O.: Perceptual evaluation of adversarial attacks for cnn-based image classification. In: 11th International Conference on Quality of Multimedia Experience QoMEX 2019, Berlin, Germany, June 5-7, 2019. pp.\u00a01\u20136. IEEE (2019). https:\/\/doi.org\/10.1109\/QOMEX.2019.8743213","DOI":"10.1109\/QOMEX.2019.8743213"},{"key":"19_CR6","unstructured":"Haralick, R., Shapiro, L.: Computer and robot vision. No. Bd. 2 in Computer and Robot Vision, Addison-Wesley Pub. Co. (1993), http:\/\/books.google.de\/books?id=LfVRAAAAMAAJ"},{"key":"19_CR7","unstructured":"He, W., Wei, J., Chen, X., Carlini, N., Song, D.: Adversarial example defense: Ensembles of weak defenses are not strong. In: Enck, W., Mulliner, C. (eds.) 11th USENIX Workshop on Offensive Technologies, WOOT 2017, Vancouver, BC, Canada, August 14-15, 2017. USENIX Association (2017)"},{"key":"19_CR8","unstructured":"He, Z., Wang, W., Dong, J., Tan, T.: Transferable sparse adversarial attack. CoRR abs\/2105.14727 (2021), https:\/\/arxiv.org\/abs\/2105.14727"},{"issue":"04","key":"19_CR9","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.27.4.040901","volume":"27","author":"G Hudson","year":"2018","unstructured":"Hudson, G., L\u00e9ger, A., Niss, B., Sebesty\u00e9n, I., Vaaben, J.: JPEG-1 standard 25 years: past, present, and future reasons for a success. J. Electronic Imaging 27(04), 040901 (2018). https:\/\/doi.org\/10.1117\/1.JEI.27.4.040901","journal-title":"J. Electronic Imaging"},{"key":"19_CR10","doi-asserted-by":"publisher","unstructured":"Jia, S., Ma, C., Yao, T., Yin, B., Ding, S., Yang, X.: Exploring frequency adversarial attacks for face forgery detection. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2022, New Orleans, LA, USA, June 18-24, 2022. pp. 4093\u20134102. IEEE (2022). https:\/\/doi.org\/10.1109\/CVPR52688.2022.00407","DOI":"10.1109\/CVPR52688.2022.00407"},{"key":"19_CR11","unstructured":"Krizhevsky, A.: Learning multiple layers of features from tiny images (2009), https:\/\/api.semanticscholar.org\/CorpusID:18268744"},{"key":"19_CR12","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial examples in the physical world. In: 5th International Conference on Learning Representations, ICLR 2017, Toulon, France, April 24-26, 2017, Workshop Track Proceedings. OpenReview.net (2017)"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S., Dong, Y., Liao, F., Liang, M., Pang, T., Zhu, J., Hu, X., Xie, C., Wang, J., Zhang, Z., Ren, Z., Yuille, A.L., Huang, S., Zhao, Y., Zhao, Y., Han, Z., Long, J., Berdibekov, Y., Akiba, T., Tokui, S., Abe, M.: Adversarial attacks and defences competition. CoRR abs\/1804.00097 (2018), http:\/\/arxiv.org\/abs\/1804.00097","DOI":"10.1007\/978-3-319-94042-7_11"},{"issue":"1","key":"19_CR14","doi-asserted-by":"publisher","DOI":"10.1117\/1.3267105","volume":"19","author":"EC Larson","year":"2010","unstructured":"Larson, E.C., Chandler, D.M.: Most apparent distortion: full-reference image quality assessment and the role of strategy. J. Electronic Imaging 19(1), 011006 (2010). https:\/\/doi.org\/10.1117\/1.3267105","journal-title":"J. Electronic Imaging"},{"key":"19_CR15","doi-asserted-by":"publisher","unstructured":"Liu, J., Lu, B., Xiong, M., Zhang, T., Xiong, H.: Low frequency sparse adversarial attack. Comput. Secur. 132, 103379 (2023). https:\/\/doi.org\/10.1016\/J.COSE.2023.103379, https:\/\/doi.org\/10.1016\/j.cose.2023.103379","DOI":"10.1016\/J.COSE.2023.103379"},{"key":"19_CR16","doi-asserted-by":"publisher","unstructured":"Luo, B., Liu, Y., Wei, L., Xu, Q.: Towards imperceptible and robust adversarial example attacks against neural networks. In: McIlraith, S.A., Weinberger, K.Q. (eds.) Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, (AAAI-18), the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18), New Orleans, Louisiana, USA, February 2-7, 2018. pp. 1652\u20131659. AAAI Press (2018). https:\/\/doi.org\/10.1609\/AAAI.V32I1.11499, https:\/\/doi.org\/10.1609\/aaai.v32i1.11499","DOI":"10.1609\/AAAI.V32I1.11499"},{"key":"19_CR17","doi-asserted-by":"publisher","unstructured":"Luo, C., Lin, Q., Xie, W., Wu, B., Xie, J., Shen, L.: Frequency-driven imperceptible adversarial attack on semantic similarity. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2022, New Orleans, LA, USA, June 18-24, 2022. pp. 15294\u201315303. IEEE (2022). https:\/\/doi.org\/10.1109\/CVPR52688.2022.01488, https:\/\/doi.org\/10.1109\/CVPR52688.2022.01488","DOI":"10.1109\/CVPR52688.2022.01488"},{"key":"19_CR18","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings. OpenReview.net (2018)"},{"key":"19_CR19","doi-asserted-by":"publisher","unstructured":"Marr, D., Hildreth, E.: Theory of Edge Detection. In: Proceedings of the Royal Society of London. Series B: Biological Sciences. vol.\u00a0207, pp. 187\u2013217 (1980). https:\/\/doi.org\/10.1098\/rspb.1980.0020","DOI":"10.1098\/rspb.1980.0020"},{"key":"19_CR20","unstructured":"Shin, R.: Jpeg-resistant adversarial images (2017), https:\/\/api.semanticscholar.org\/CorpusID:204804905"},{"key":"19_CR21","doi-asserted-by":"publisher","unstructured":"Wang, X., He, K.: Enhancing the transferability of adversarial attacks through variance tuning. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2021, virtual, June 19-25, 2021. pp. 1924\u20131933. Computer Vision Foundation \/ IEEE (2021). https:\/\/doi.org\/10.1109\/CVPR46437.2021.00196","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"19_CR22","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.4414861","author":"R Wightman","year":"2019","unstructured":"Wightman, R.: Pytorch image models (2019). https:\/\/doi.org\/10.5281\/zenodo.4414861","journal-title":"Pytorch image models"},{"key":"19_CR23","unstructured":"Wong, E., Rice, L., Kolter, J.Z.: Fast is better than free: Revisiting adversarial training. In: 8th International Conference on Learning Representations, ICLR 2020, Addis Ababa, Ethiopia, April 26-30, 2020. OpenReview.net (2020)"},{"issue":"1","key":"19_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-020-00112-z","volume":"2020","author":"H Zhang","year":"2020","unstructured":"Zhang, H., Avrithis, Y., Furon, T., Amsaleg, L.: Smooth adversarial examples. EURASIP J. Inf. Secur. 2020(1), 1\u201312 (2020). https:\/\/doi.org\/10.1186\/s13635-020-00112-z","journal-title":"EURASIP J. Inf. Secur."}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78312-8_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T13:06:47Z","timestamp":1733231207000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78312-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,4]]},"ISBN":["9783031783111","9783031783128"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78312-8_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,4]]},"assertion":[{"value":"4 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icpr2024.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}