{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T01:33:50Z","timestamp":1755221630590,"version":"3.43.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032006264","type":"print"},{"value":"9783032006271","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-00627-1_21","type":"book-chapter","created":{"date-parts":[[2025,8,9]],"date-time":"2025-08-09T04:22:15Z","timestamp":1754713335000},"page":"420-430","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fooling Rate and\u00a0Perceptual Similarity: A Study on\u00a0the\u00a0Effectiveness and\u00a0Quality of\u00a0DCGAN-based Adversarial Attacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-0595-0468","authenticated-orcid":false,"given":"Jos\u00e9","family":"Areia","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6883-7996","authenticated-orcid":false,"given":"Leonel","family":"Santos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2306-7585","authenticated-orcid":false,"given":"Rog\u00e9rio Lu\u00eds de C.","family":"Costa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,10]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Liu, X., Zhong, Y., Zhang, Y., Qin, L., Deng, W.: Enhancing generalization of universal adversarial perturbation through gradient aggregation. arXiv preprint arXiv:2308.06015 (2023)","DOI":"10.1109\/ICCV51070.2023.00409"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. arXiv preprint arXiv:5120.0567 (2015)","DOI":"10.1109\/CVPR.2016.308"},{"key":"21_CR3","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2015)"},{"issue":"2","key":"21_CR4","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSEC.2018.2888775","volume":"17","author":"M Al-Rubaie","year":"2019","unstructured":"Al-Rubaie, M., Chang, J.M.: Privacy-preserving machine learning: threats and solutions. IEEE Secur. Priv. 17(2), 49\u201358 (2019). https:\/\/doi.org\/10.1109\/MSEC.2018.2888775","journal-title":"IEEE Secur. Priv."},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Frossard, P.: DeepFool: a simple and accurate method to fool deep neural networks. arXiv preprint arXiv:1511.04599 (2016)","DOI":"10.1109\/CVPR.2016.282"},{"key":"21_CR6","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2019)"},{"issue":"1","key":"21_CR7","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1049\/cit2.12028","volume":"6","author":"A Chakraborty","year":"2021","unstructured":"Chakraborty, A., Alam, M., Dey, V., Chattopadhyay, A., Mukhopadhyay, D.: A survey on adversarial attacks and defences. CAAI Trans. Intell. Technol. 6(1), 25\u201345 (2021). https:\/\/doi.org\/10.1049\/cit2.12028","journal-title":"CAAI Trans. Intell. Technol."},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. arXiv preprint arXiv:1608.04644 (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"21_CR9","doi-asserted-by":"publisher","unstructured":"Liu, Y., Feng, X., Wang, Y., Yang, W., Ming, D.: TRM-UAP: enhancing the transferability of data-free universal adversarial perturbation via truncated ratio maximization. In: 2023 International Conference on Computer Vision (ICCV), pp. 4739\u20134748 (2023). https:\/\/doi.org\/10.1109\/ICCV51070.2023.00439","DOI":"10.1109\/ICCV51070.2023.00439"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Fawzi, O., Frossard, P.: Universal adversarial perturbations. arXiv preprint arXiv:arXiv1610.08401 (2017)","DOI":"10.1109\/CVPR.2017.17"},{"key":"21_CR11","unstructured":"Mopuri, K.R., Garg, U., Babu, R.V.: Fast feature fool: a data independent approach to universal adversarial perturbations. arXiv preprint arXiv:1707.05572 (2017)"},{"issue":"1","key":"21_CR12","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MSP.2017.2765202","volume":"35","author":"A Creswell","year":"2018","unstructured":"Creswell, A., White, T., Dumoulin, V., Arulkumaran, K., Sengupta, B., Bharath, A.A.: Generative adversarial networks: an overview. IEEE Sig. Process. Mag. 35(1), 53\u201365 (2018). https:\/\/doi.org\/10.1109\/MSP.2017.2765202","journal-title":"IEEE Sig. Process. Mag."},{"issue":"6","key":"21_CR13","doi-asserted-by":"publisher","first-page":"4117","DOI":"10.1007\/s11063-021-10584-w","volume":"53","author":"H Liu","year":"2021","unstructured":"Liu, H., Li, D., Li, Y.: Poisonous label attack: black-box data poisoning attack with enhanced conditional DCGAN. Neural Process. Lett. 53(6), 4117\u20134142 (2021). https:\/\/doi.org\/10.1007\/s11063-021-10584-w","journal-title":"Neural Process. Lett."},{"key":"21_CR14","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, vol.\u00a027, Curran Associates, Inc. (2014)"},{"key":"21_CR15","unstructured":"Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 (2016)"},{"key":"21_CR16","doi-asserted-by":"publisher","unstructured":"Liu, B., Lv, J., Fan, X., Luo, J., Zou, T.: Application of an improved DCGAN for image generation. Mobile Inf. Syst. 2022(1) (2022). https:\/\/doi.org\/10.1155\/2022\/9005552","DOI":"10.1155\/2022\/9005552"},{"issue":"1","key":"21_CR17","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/LCOMM.2024.3503721","volume":"29","author":"Q Yan","year":"2025","unstructured":"Yan, Q., Xiong, W., Wang, H.M.: Secure indoor localization against adversarial attacks using DCGAN. IEEE Commun. Lett. 29(1), 130\u2013134 (2025). https:\/\/doi.org\/10.1109\/LCOMM.2024.3503721","journal-title":"IEEE Commun. Lett."},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Xiao, C., Li, B., Zhu, J.Y., He, W., Liu, M., Song, D.: Generating adversarial examples with adversarial networks. arXiv preprint arXiv:1801.02610 (2019)","DOI":"10.24963\/ijcai.2018\/543"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Deng, B., Ran, Z., Chen, J., Zheng, D., Yang, Q., Tian, L.: Adversarial examples generation algorithm through DCGAN. Intell. Autom. Soft Comput. 30(3) (2021)","DOI":"10.32604\/iasc.2021.019727"},{"key":"21_CR20","unstructured":"Mopuri, K.R., Ganeshan, A., Babu, R.V.: Generalizable data-free objective for crafting universal adversarial perturbations. arXiv preprint arXiv:arXiv1801.08092 (2018)"},{"key":"21_CR21","unstructured":"Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., Hochreiter, S.: GANs trained by a two time-scale update rule converge to a local Nash equilibrium. In: Advances in Neural Information Processing Systems, vol.\u00a030, Curran Associates, Inc. (2017)"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, R., Isola, P., Efros, A.A., Shechtman, E., Wang, O.: The unreasonable effectiveness of deep features as a perceptual metric. arXiv preprint arXiv:1801.03924 (2018)","DOI":"10.1109\/CVPR.2018.00068"},{"key":"21_CR23","unstructured":"Howard, J., Husain, H.: Imagewoof (2020). https:\/\/github.com\/fastai\/imagenette"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Russakovsky, O., et al.: ImageNet large scale visual recognition challenge. arXiv preprint arXiv:1409.0575 (2015)","DOI":"10.1007\/s11263-015-0816-y"},{"key":"21_CR25","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2017)"},{"key":"21_CR26","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: International Conference on Learning Representations (2015)"},{"key":"21_CR27","doi-asserted-by":"publisher","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770\u2013778 (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00627-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,9]],"date-time":"2025-08-09T04:22:22Z","timestamp":1754713342000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00627-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032006264","9783032006271"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00627-1_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ares-12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.ares-conference.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}