{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T18:46:07Z","timestamp":1767725167297,"version":"build-2238731810"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031877711","type":"print"},{"value":"9783031877728","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87772-8_10","type":"book-chapter","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T03:30:48Z","timestamp":1745292648000},"page":"113-126","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Investigating the\u00a0Transferability and\u00a0Robustness of\u00a0Adversarial Attacks Between Standard and\u00a0Dilated CNN Architectures"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-2796-5838","authenticated-orcid":false,"given":"Sachin","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Jiho","family":"Noh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6558-2107","authenticated-orcid":false,"given":"Michail S.","family":"Alexiou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,23]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.patrec.2023.11.004","volume":"176","author":"MS Alexiou","year":"2023","unstructured":"Alexiou, M.S., Bourbakis, N.G.: Behavioral analysis of bar charts in documents via stochastic petri-net modeling. Pattern Recogn. Lett. 176, 174\u2013181 (2023). https:\/\/doi.org\/10.1016\/j.patrec.2023.11.004","journal-title":"Pattern Recogn. Lett."},{"key":"10_CR2","doi-asserted-by":"publisher","unstructured":"Alexiou, M.S., Bourbakis, N.G.: Kyrtos: A methodology for automatic deep analysis of graphic charts with curves in technical documents. Pattern Recogn. 157(C) (2024). https:\/\/doi.org\/10.1016\/j.patcog.2024.110930","DOI":"10.1016\/j.patcog.2024.110930"},{"key":"10_CR3","doi-asserted-by":"publisher","unstructured":"Alexiou, M.S., Mertoguno, J.S.: A survey on recent advancements in lightweight generative adversarial networks, their applications and datasets. In: 2023 IEEE 35th International Conference on Tools with Artificial Intelligence (ICTAI), pp. 269\u2013278 (2023). https:\/\/doi.org\/10.1109\/ICTAI59109.2023.00047","DOI":"10.1109\/ICTAI59109.2023.00047"},{"issue":"12","key":"10_CR4","doi-asserted-by":"publisher","first-page":"3040","DOI":"10.1109\/TPAMI.2019.2919707","volume":"42","author":"A Arnab","year":"2020","unstructured":"Arnab, A., Miksik, O., Torr, P.: On the robustness of semantic segmentation models to adversarial attacks. IEEE Trans. Pattern Anal. Mach. Intell. 42(12), 3040\u20133053 (2020). https:\/\/doi.org\/10.1109\/TPAMI.2019.2919707","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Byun, J., Cho, S., Kwon, M.J., Kim, H.S., Kim, C.: Improving the transferability of targeted adversarial examples through object-based diverse input. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 15244\u201315253 (2022)","DOI":"10.1109\/CVPR52688.2022.01481"},{"key":"10_CR6","doi-asserted-by":"publisher","unstructured":"C\u00e9saire, M., Schott, L., Hajri, H., Lamprier, S., Gallinari, P.: Stochastic sparse adversarial attacks. In: 2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI), pp. 1247\u20131254 (2021). https:\/\/doi.org\/10.1109\/ICTAI52525.2021.00198","DOI":"10.1109\/ICTAI52525.2021.00198"},{"key":"10_CR7","doi-asserted-by":"publisher","unstructured":"Fan, M., Guo, W., Ying, Z., Liu, X.: Enhance transferability of adversarial examples with model architecture. In: ICASSP 2023\u20132023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.\u00a01\u20135 (2023). https:\/\/doi.org\/10.1109\/ICASSP49357.2023.10097192","DOI":"10.1109\/ICASSP49357.2023.10097192"},{"issue":"4","key":"10_CR8","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/BF00344251","volume":"36","author":"K Fukushima","year":"1980","unstructured":"Fukushima, K.: Neocognitron: a self-organizing neural network model for a mechanism of pattern recognition unaffected by shift in position. Biol. Cybern. 36(4), 193\u2013202 (1980)","journal-title":"Biol. Cybern."},{"key":"10_CR9","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples (2015). https:\/\/arxiv.org\/abs\/1412.6572"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Hou, Y., Guo, Q., Huang, Y., Xie, X., Ma, L., Zhao, J.: Evading DeepFake detectors via adversarial statistical consistency. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 12271\u201312280 (2023)","DOI":"10.1109\/CVPR52729.2023.01181"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Hsiung, L., Tsai, Y.Y., Chen, P.Y., Ho, T.Y.: Towards compositional adversarial robustness: Generalizing adversarial training to composite semantic perturbations. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 24658\u201324667 (2023)","DOI":"10.1109\/CVPR52729.2023.02362"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Huang, S., Lu, Z., Deb, K., Boddeti, V.N.: Revisiting residual networks for adversarial robustness. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 8202\u20138211 (2023)","DOI":"10.1109\/CVPR52729.2023.00793"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/978-3-031-28451-9_43","volume-title":"Advanced Information Networking and Applications","author":"H Kaur","year":"2023","unstructured":"Kaur, H., Shukla, R., Echizen, I., Khanna, P.: Secure and privacy preserving proxy biometric identities. In: Barolli, L. (ed.) Advanced Information Networking and Applications, pp. 487\u2013500. Springer International Publishing, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-28451-9_43"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Li, Z., et al.: Sibling-attack: rethinking transferable adversarial attacks against face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 24626\u201324637 (2023)","DOI":"10.1109\/CVPR52729.2023.02359"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-030-99584-3_13","volume-title":"Advanced Information Networking and Applications","author":"FN Motlagh","year":"2022","unstructured":"Motlagh, F.N., Kayem, A., Meinel, C.: A multi-agent model to support privacy preserving co-owned image sharing on social media. In: Barolli, L., Hussain, F., Enokido, T. (eds.) Advanced Information Networking and Applications, pp. 140\u2013151. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99584-3_13"},{"key":"10_CR16","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I.: Transferability in machine learning: from phenomena to black-box attacks using adversarial samples (2016). https:\/\/arxiv.org\/abs\/1605.07277"},{"key":"10_CR17","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks (2014). https:\/\/arxiv.org\/abs\/1312.6199"},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"Tu, B., He, W., Li, Q., Peng, Y., Plaza, A.: A new context-aware framework for defending against adversarial attacks in hyperspectral image classification. IEEE Trans. Geosci. Remote Sens. 61, 1\u201314 (2023). https:\/\/doi.org\/10.1109\/TGRS.2023.3250450","DOI":"10.1109\/TGRS.2023.3250450"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Wang, K., He, X., Wang, W., Wang, X.: Boosting adversarial transferability by block shuffle and rotation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 24336\u201324346 (2024)","DOI":"10.1109\/CVPR52733.2024.02297"},{"key":"10_CR20","doi-asserted-by":"publisher","unstructured":"Xiong, Y., Lin, J., Zhang, M., Hopcroft, J.E., He, K.: Stochastic variance reduced ensemble adversarial attack for boosting the adversarial transferability. In: 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 14963\u201314972 (2022). https:\/\/doi.org\/10.1109\/CVPR52688.2022.01456","DOI":"10.1109\/CVPR52688.2022.01456"},{"key":"10_CR21","unstructured":"Yu, F.: Multi-scale context aggregation by dilated convolutions. arXiv preprint arXiv:1511.07122 (2015)"},{"key":"10_CR22","doi-asserted-by":"publisher","unstructured":"Yuan, L., Zheng, X., Zhou, Y., Hsieh, C.J., Chang, K.W.: On the transferability of adversarial attacks against neural text classifier. In: Moens, M.F., Huang, X., Specia, L., Yih, S.W.t. (eds.) Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, pp. 1612\u20131625. Association for Computational Linguistics, Online and Punta Cana, Dominican Republic (2021).https:\/\/doi.org\/10.18653\/v1\/2021.emnlp-main.121, https:\/\/aclanthology.org\/2021.emnlp-main.121","DOI":"10.18653\/v1\/2021.emnlp-main.121"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, J., et al.: Improving adversarial transferability via neuron attribution-based attacks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 14993\u201315002 (2022)","DOI":"10.1109\/CVPR52688.2022.01457"},{"key":"10_CR24","doi-asserted-by":"publisher","unstructured":"Zhao, L., Zhang, Y., Shi, C., Zhao, M., Wu, J., Li, W.: APNet: a novel antiperturbation network for robust hyperspectral image classification against adversarial attacks. IEEE Trans. Geosci. Remote Sens. 62, 1\u201314 (2024).https:\/\/doi.org\/10.1109\/TGRS.2024.3467088","DOI":"10.1109\/TGRS.2024.3467088"},{"key":"10_CR25","doi-asserted-by":"publisher","first-page":"105545","DOI":"10.1109\/ACCESS.2023.3319389","volume":"11","author":"E \u00c1lvarez","year":"2023","unstructured":"\u00c1lvarez, E., \u00c1lvarez, R., Cazorla, M.: Exploring transferability on adversarial attacks. IEEE Access 11, 105545\u2013105556 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3319389","journal-title":"IEEE Access"}],"updated-by":[{"DOI":"10.1007\/978-3-031-87772-8_39","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T00:00:00Z","timestamp":1745366400000}}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87772-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T14:38:00Z","timestamp":1751553480000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87772-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877711","9783031877728"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87772-8_10","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"23 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"23 April 2025","order":2,"name":"change_date","label":"Change Date","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"A correction has been published.","order":4,"name":"change_details","label":"Change Details","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}