{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:53:50Z","timestamp":1759334030294,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":57,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032061089"},{"type":"electronic","value":"9783032061096"}],"license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-06109-6_6","type":"book-chapter","created":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T10:03:17Z","timestamp":1759226597000},"page":"92-110","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Interpretable Adversarial Examples via\u00a0Sparse Adversarial Attack"],"prefix":"10.1007","author":[{"given":"Fudong","family":"Lin","sequence":"first","affiliation":[]},{"given":"Jiadong","family":"Lou","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Brian","family":"Jalaian","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,1]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2024.102451","volume":"167","author":"A Ali","year":"2025","unstructured":"Ali, A., et al.: Enabling scalable and adaptive machine learning training via serverless computing on public cloud. Perform. Eval. 167, 102451 (2025)","journal-title":"Perform. Eval."},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.A.: Towards evaluating the robustness of neural networks. In: IEEE Symposium on Security and Privacy (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Chen, J., Jordan, M.I., Wainwright, M.J.: Hopskipjumpattack: a query-efficient decision-based attack. In: IEEE Symposium on Security and Privacy, 2020 (2020)","DOI":"10.1109\/SP40000.2020.00045"},{"key":"6_CR4","unstructured":"Chen, L., Min, Y., Zhang, M., Karbasi, A.: More data can expand the generalization gap between adversarially robust and standard models. In: International Conference on Machine Learning (ICML) (2020)"},{"key":"6_CR5","unstructured":"Chu, T., et al.: Bonemet: an open large-scale multi-modal murine dataset for breast cancer bone metastasis diagnosis and prognosis. In: The Thirteenth International Conference on Learning Representations (ICLR) (2025)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Croce, F., Andriushchenko, M., Singh, N.D., Flammarion, N., Hein, M.: A versatile framework for query-efficient sparse black-box adversarial attacks. In: AAAI, Sparse-rs (2022)","DOI":"10.1609\/aaai.v36i6.20595"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Croce, F., Hein, M.: Sparse and imperceivable adversarial attacks. In: ICCV (2019)","DOI":"10.1109\/ICCV.2019.00482"},{"key":"6_CR8","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. In: Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT) (2019)"},{"key":"6_CR9","unstructured":"Dong, X., et al.: Distortion-aware sparse adversarial attack. In: NeurIPS, Greedyfool (2020)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Dong, Y., et al.: Boosting adversarial attacks with momentum. In: Conference on Computer Vision and Pattern Recognition (CVPR) (2018)","DOI":"10.1109\/CVPR.2018.00957"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Dong, Y., Pang, T., Su, H., Zhu, J.: Evading defenses to transferable adversarial examples by translation-invariant attacks. In: Conference on Computer Vision and Pattern Recognition (CVPR) (2019)","DOI":"10.1109\/CVPR.2019.00444"},{"key":"6_CR12","unstructured":"Dosovitskiy, A., et al.: An image is worth 16x16 words: transformers for image recognition at scale. In: ICLR (2021)"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Eykholt, K., et al.: Robust physical-world attacks on deep learning visual classification. In: CVPR (2018)","DOI":"10.1109\/CVPR.2018.00175"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Fan, Y., et al.: Sparse adversarial attack via perturbation factorization. In: ECCV (2020)","DOI":"10.1007\/978-3-030-58542-6_3"},{"key":"6_CR15","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: International Conference on Learning Representations (ICLR) (2015)"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"He, Y., Lin, F., Yuan, X., Tzeng, N.-F.: Interpretable minority synthesis for imbalanced classification. In: Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence (IJCAI), pp. 2542\u20132548 (2021)","DOI":"10.24963\/ijcai.2021\/350"},{"issue":"7873","key":"6_CR18","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1038\/s41586-021-03819-2","volume":"596","author":"J Jumper","year":"2021","unstructured":"Jumper, J., et al.: Highly accurate protein structure prediction with alphafold. Nature 596(7873), 583\u2013589 (2021)","journal-title":"Nature"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Kong, Z., Guo, J., Li, A., Liu, C.: Physgan: generating physical-world-resilient adversarial examples for autonomous driving. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2020)","DOI":"10.1109\/CVPR42600.2020.01426"},{"key":"6_CR20","unstructured":"Krizhevsky, A., Hinton, G., et\u00a0al.: Learning multiple layers of features from tiny images. Technical Report, University of Toronto (2009)"},{"key":"6_CR21","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems (NIPS) (2012)"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial examples in the physical world. In: International Conference on Learning Representations (ICLR) (2017)","DOI":"10.1201\/9781351251389-8"},{"key":"6_CR23","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial machine learning at scale. In: 5th International Conference on Learning Representations (ICLR) (2017)"},{"key":"6_CR24","unstructured":"Lan, G., et al.: Contextual integrity in LLMs via reasoning and reinforcement learning. arXiv preprint arXiv:2506.04245 (2025)"},{"key":"6_CR25","unstructured":"LeCun, Y., Cortes, C.: MNIST handwritten digit database (2010)"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Lin, F., Crawford, S., Guillot, K., Zhang, Y., Chen, Y., Yuan, X., et\u00a0al.: Mmst-vit: climate change-aware crop yield prediction via multi-modal spatial-temporal vision transformer. In: IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 5751\u20135761 (2023)","DOI":"10.1109\/ICCV51070.2023.00531"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Lin, F., Lou, J., Yuan, X., Tzeng, N.-F.: Towards robust vision transformer via masked adaptive ensemble. In: Proceedings of the 33rd ACM International Conference on Information and Knowledge Management (CIKM), pp. 1389\u20131399 (2024)","DOI":"10.1145\/3627673.3679750"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Lin, F., et al.: Comprehensive transformer-based model architecture for real-world storm prediction. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases (ECML-PKDD), pp. 54\u201371 (2023)","DOI":"10.1007\/978-3-031-43430-3_4"},{"key":"6_CR29","unstructured":"Liu, Y., Chen, X., Liu, C., Song, D.: Delving into transferable adversarial examples and black-box attacks. In: ICLR (2017)"},{"key":"6_CR30","unstructured":"Louizos, C., Welling, M., Kingma, D.P.: Learning sparse neural networks through l_0 regularization. In: ICLR (2018)"},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"Ma, X., et al.: Malletrain: deep neural networks training on unfillable supercomputer nodes. In: Proceedings of the 15th ACM\/SPEC International Conference on Performance Engineering, pp. 190\u2013200 (2024)","DOI":"10.1145\/3629526.3645035"},{"key":"6_CR32","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: International Conference on Learning Representations (ICLR) (2018)"},{"key":"6_CR33","unstructured":"Min, Y., Chen, L., Karbasi, A.: The curious case of adversarially robust models: more data can help, double descend, or hurt generalization. In: Uncertainty in Artificial Intelligence (2021)"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Ming, D., Ren, P., Wang, Y., Feng, X.: Transferable structural sparse adversarial attack via exact group sparsity training. In: Computer Vision and Pattern Recognition (CVPR), pp. 24696\u201324705 (2024)","DOI":"10.1109\/CVPR52733.2024.02332"},{"key":"6_CR35","doi-asserted-by":"crossref","unstructured":"Modas, A., Moosavi-Dezfooli, S.-M., Frossard, P.: Sparsefool: a few pixels make a big difference. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2019)","DOI":"10.1109\/CVPR.2019.00930"},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.-M., Fawzi, A., Frossard, P.: Deepfool: a simple and accurate method to fool deep neural networks. In: Conference on Computer Vision and Pattern Recognition (CVPR) (2016)","DOI":"10.1109\/CVPR.2016.282"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Papernot, N., et al.: The limitations of deep learning in adversarial settings. In: European Symposium on Security and Privacy (EuroS &P) (2016)","DOI":"10.1109\/EuroSP.2016.36"},{"key":"6_CR38","unstructured":"Pintor, M., Roli, F., Brendel, W., Biggio, B.: Fast minimum-norm adversarial attacks through adaptive norm constraints. In: Neural Information Processing Systems (NeurIPS), pp. 20052\u201320062 (2021)"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Rives, A., et al.: Biological structure and function emerge from scaling unsupervised learning to 250 million protein sequences. Proceedings of the National Academy of Sciences 118(15) (2021)","DOI":"10.1073\/pnas.2016239118"},{"key":"6_CR40","doi-asserted-by":"crossref","unstructured":"Russakovsky, O., et al.: ImageNet Large Scale Visual Recognition Challenge. Int. J. Comput. Vis. (IJCV) (2015)","DOI":"10.1007\/s11263-015-0816-y"},{"key":"6_CR41","unstructured":"Ramprasaath, R., et al.: Visual explanations from deep networks via gradient-based localization. In: ICCV, Grad-cam (2017)"},{"key":"6_CR42","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: International Conference on Learning Representations (ICLR) (2015)"},{"key":"6_CR43","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858","volume-title":"One pixel attack for fooling deep neural networks","author":"J Su","year":"2019","unstructured":"Su, J., Vargas, D.V., Sakurai, K.: One pixel attack for fooling deep neural networks. IEEE Trans. Evol, Comput (2019)"},{"key":"6_CR44","unstructured":"Suya, F., Chi, J., Evans, D., Tian, Y.: Finding black-box adversarial examples with limited queries. In: USENIX, Hybrid batch attacks (2020)"},{"key":"6_CR45","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: International Conference on Learning Representations (ICLR) (2014)"},{"key":"6_CR46","doi-asserted-by":"crossref","unstructured":"Thys, S., Van Ranst, W., Goedem\u00e9, T.: Fooling automated surveillance cameras: Adversarial patches to attack person detection. In: IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2019)","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"6_CR47","unstructured":"Tram\u00e8r, F., Kurakin, A., Papernot, N., Goodfellow, I.J., Boneh, D., McDaniel, P.D.: Ensemble adversarial training: attacks and defenses. In: International Conference on Learning Representations (ICLR) (2018)"},{"key":"6_CR48","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems (NIPS) (2017)"},{"key":"6_CR49","unstructured":"Vo, V.Q., Abbasnejad, E., Ranasinghe, D.: Brusleattack: a query-efficient score- based black-box sparse adversarial attack. In: International Conference on Learning Representations (ICLR) (2024)"},{"key":"6_CR50","doi-asserted-by":"crossref","unstructured":"Wikipedia. Heaviside step function (2024). Accessed 01 Jan 2024","DOI":"10.33140\/ATCP.07.04.02"},{"key":"6_CR51","doi-asserted-by":"crossref","unstructured":"Williams, P.N., Li, K.: Black-box sparse adversarial attack via multi-objective optimisation. In: Computer Vision and Pattern Recognition (CVPR) (2023)","DOI":"10.1109\/CVPR52729.2023.01183"},{"key":"6_CR52","unstructured":"Wong, E., Rice, L., Zico Kolter, J.: Fast is better than free: Revisiting adversarial training. In: International Conference on Learning Representations (ICLR) (2020)"},{"key":"6_CR53","doi-asserted-by":"crossref","unstructured":"Xie, C., et al.: Improving transferability of adversarial examples with input diversity. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2019)","DOI":"10.1109\/CVPR.2019.00284"},{"key":"6_CR54","unstructured":"Kaidi, X., et al.: Towards general implementation and better interpretability. In: ICLR, Structured adversarial attack (2019)"},{"key":"6_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2024.102450","volume":"167","author":"S Zawad","year":"2025","unstructured":"Zawad, S., et al.: Fedcust: offloading hyperparameter customization for federated learning. Perform. Eval. 167, 102450 (2025)","journal-title":"Perform. Eval."},{"key":"6_CR56","doi-asserted-by":"crossref","unstructured":"Zeiler, M.D., Fergus, R.: Visualizing and understanding convolutional networks. In: European Conference on Computer Vision (2014)","DOI":"10.1007\/978-3-319-10590-1_53"},{"key":"6_CR57","unstructured":"Zhu, M., Chen, T., Wang, Z.: Sparse and imperceptible adversarial attack via a homotopy algorithm. In: ICML (202)1"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases. Research Track"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-06109-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T10:04:11Z","timestamp":1759226651000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-06109-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,1]]},"ISBN":["9783032061089","9783032061096"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-06109-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,1]]},"assertion":[{"value":"1 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Porto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ecmlpkdd.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}