{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:42:47Z","timestamp":1742960567962,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":53,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811536847"},{"type":"electronic","value":"9789811536854"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-3685-4_15","type":"book-chapter","created":{"date-parts":[[2020,5,20]],"date-time":"2020-05-20T15:19:49Z","timestamp":1589987989000},"page":"401-430","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["One-Pixel Attack: Understanding and Improving Deep Neural Networks with Evolutionary Computation"],"prefix":"10.1007","author":[{"given":"Danilo Vasconcellos","family":"Vargas","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,21]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","volume":"23","author":"J Su","year":"2019","unstructured":"Su, J., Vargas, D.V., Kouichi, S.: One pixel attack for fooling deep neural networks. IEEE Trans. Evol. Comput. 23, 828\u2013841 (2019)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"4","key":"15_CR2","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1023\/A:1008202821328","volume":"11","author":"R Storn","year":"1997","unstructured":"Storn, R., Price, K.: Differential evolution\u2013a simple and efficient heuristic for global optimization over continuous spaces. J. Glob. Optim. 11(4), 341\u2013359 (1997)","journal-title":"J. Glob. Optim."},{"issue":"1","key":"15_CR3","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TEVC.2010.2059031","volume":"15","author":"S Das","year":"2011","unstructured":"Das, S., Suganthan, P.N.: Differential evolution: a survey of the state-of-the-art. IEEE Trans. Evol. Comput. 15(1), 4\u201331 (2011)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Narodytska, N., Kasiviswanathan, S.: Simple black-box adversarial attacks on deep neural networks. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1310\u20131318. IEEE, Piscataway (2017)","DOI":"10.1109\/CVPRW.2017.172"},{"key":"15_CR5","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples (2014). Preprint arXiv:1412.6572"},{"key":"15_CR6","unstructured":"Vargas, D.V., Su, J.: Understanding the one-pixel attack: Propagation maps and locality analysis (2019) Preprint arXiv:1902.02947"},{"key":"15_CR7","unstructured":"Brendel, W., Bethge, M.: Approximating CNNs with bag-of-local-features models works surprisingly well on ImageNet (2019). Preprint arXiv:1904.00760"},{"key":"15_CR8","unstructured":"Geirhos, R., Rubisch, P., Michaelis, C., Bethge, M., Wichmann, F.A., Brendel, W.: ImageNet-trained CNNs are biased towards texture; increasing shape bias improves accuracy and robustness. In: International Conference on Learning Representations 2019 (2019)"},{"key":"15_CR9","unstructured":"Ilyas, A., Santurkar, S., Tsipras, D., Engstrom, L., Tran, B., Madry, A.: Adversarial examples are not bugs, they are features (2019). Preprint arXiv:1905.02175"},{"key":"15_CR10","unstructured":"Gilmer, J., Ford, N., Carlini, N., Cubuk, E.: Adversarial examples are a natural consequence of test error in noise. In: International Conference on Machine Learning, pp. 2280\u20132289 (2019)"},{"key":"15_CR11","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: International Conference on Learning Representations. Citeseer (2014)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Nguyen, A., Yosinski, J., Clune, J.: Deep neural networks are easily fooled: High confidence predictions for unrecognizable images. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 427\u2013436 (2015)","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.-M., Fawzi, A., Fawzi, O., Frossard, P.: Universal adversarial perturbations. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 86\u201394. IEEE, Piscataway (2017)","DOI":"10.1109\/CVPR.2017.17"},{"key":"15_CR14","unstructured":"Brown, T.B., Man\u00e9, D., Roy, A., Abadi, M., Gilmer, J.: Adversarial patch (2017). Preprint arXiv:1712.09665"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Liang, B., Su, M., You, W., Shi, W., Yang, G.: Cracking classifiers for evasion: a case study on the Google\u2019s phishing pages filter. In: Proceedings of the 25th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, pp. 345\u2013356 (2016)","DOI":"10.1145\/2872427.2883060"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Li, D., Vargas, D.V., Kouichi, S.: Universal rules for fooling deep neural networks based text classification. In: Proceeding of the IEEE CEC 2019 (2019)","DOI":"10.1109\/CEC.2019.8790213"},{"key":"15_CR17","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S.: Adversarial examples in the physical world. Preprint arXiv:1607.02533 (2016)"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., Reiter, M.K.: Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1528\u20131540. ACM, New York (2016)","DOI":"10.1145\/2976749.2978392"},{"key":"15_CR19","unstructured":"Athalye, A., Sutskever, I.: Synthesizing robust adversarial examples. In: International Conference on Machine Learning (2018)"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Wu, X., Jha, S., Swami, A.: Distillation as a defense to adversarial perturbations against deep neural networks. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 582\u2013597. IEEE, Piscataway (2016)","DOI":"10.1109\/SP.2016.41"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 39\u201357. IEEE, Piscataway (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"15_CR22","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples (2014). Preprint arXiv:1412.6572."},{"key":"15_CR23","unstructured":"Huang, R., Xu, B., Schuurmans, D., Szepesv\u00e1ri, C.: Learning with a strong adversary (2015). Preprint arXiv:1511.03034"},{"key":"15_CR24","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: International Conference on Machine Learning (2018)"},{"key":"15_CR25","unstructured":"Tram\u00e8r, F., Kurakin, A., Papernot, N., Goodfellow, I., Boneh, D., McDaniel, P.: Ensemble adversarial training: Attacks and defenses. In: International Conference on Learning Representations (2018)"},{"key":"15_CR26","unstructured":"Vargas, D.V., Kotyan, S.: Robustness assessment for adversarial machine learning: Problems, solutions and a survey of current neural networks and defenses (2019). Preprint arXiv:1906.06026"},{"key":"15_CR27","unstructured":"Ma, X., Li, B., Wang, Y., Erfani, S.M., Wijewickrema, S., Schoenebeck, G., Song, D., Houle, M.E., Bailey, J.: Characterizing adversarial subspaces using local intrinsic dimensionality (2018). Preprint arXiv:1801.02613"},{"key":"15_CR28","unstructured":"Guo, C., Rana, M., Cisse, M., van der Maaten, L.: Countering adversarial images using input transformations. In: International Conference on Learning Representations (2018)"},{"key":"15_CR29","unstructured":"Athalye, A., Carlini, N., Wagner, D.: Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. In: International Conference on Machine Learning (2018)"},{"key":"15_CR30","unstructured":"Uesato, J., O\u2019Donoghue, B., Kohli, P., Oord, A.: Adversarial risk and the dangers of evaluating against weak attacks. In: International Conference on Machine Learning, pp. 5032\u20135041 (2018)"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Bendale, A., Boult, T.E.: Towards open set deep networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1563\u20131572 (2016)","DOI":"10.1109\/CVPR.2016.173"},{"key":"15_CR32","unstructured":"Sabour, S., Frosst, N., Hinton, G.E.: Dynamic routing between capsules. In: Advances in Neural Information Processing Systems, pp. 3856\u20133866 (2017)"},{"key":"15_CR33","unstructured":"Grosse, K., Manoharan, P., Papernot, N., Backes, M., McDaniel, P.: On the (statistical) detection of adversarial examples (2017). Preprint arXiv:1702.06280"},{"key":"15_CR34","doi-asserted-by":"crossref","unstructured":"Xu, W., Evans, D., Qi, Y.: Feature squeezing: Detecting adversarial examples in deep neural networks. In: Network and Distributed Systems Security Symposium (NDSS) (2018)","DOI":"10.14722\/ndss.2018.23198"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Adversarial examples are not easily detected: Bypassing ten detection methods. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp. 3\u201314. ACM, New York (2017)","DOI":"10.1145\/3128572.3140444"},{"key":"15_CR36","unstructured":"Carlini, N., Wagner, D: Magnet and \u201cefficient defenses against adversarial attacks\u201d are not robust to adversarial examples (2017). Preprint arXiv:1711.08478"},{"issue":"1","key":"15_CR37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1162\/106365603321828970","volume":"11","author":"N Hansen","year":"2003","unstructured":"Hansen, N., M\u00fcller, S.D., Koumoutsakos, P.: Reducing the time complexity of the derandomized evolution strategy with covariance matrix adaptation (CMA-ES). Evol. Comput. 11(1), 1\u201318 (2003)","journal-title":"Evol. Comput."},{"key":"15_CR38","unstructured":"Zagoruyko, S., Komodakis, N.: Wide residual networks (2016). Preprint arXiv:1605.07146"},{"key":"15_CR39","unstructured":"Iandola, F., Moskewicz, M., Karayev, S., Girshick, R., Darrell, T., Keutzer, K.: DenseNet: Implementing efficient ConvNet descriptor pyramids (2014). Preprint arXiv:1404.1869"},{"key":"15_CR40","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"15_CR41","unstructured":"Lin, M., Chen, Q., Yan, S.: Network in network (2013). Preprint arXiv:1312.4400"},{"key":"15_CR42","unstructured":"Springenberg, J.T., Dosovitskiy, A., Brox, T., Riedmiller, M.: Striving for simplicity: The all convolutional net (2014). Preprint arXiv:1412.6806"},{"issue":"11","key":"15_CR43","doi-asserted-by":"crossref","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P., et al.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"15_CR44","unstructured":"Vargas, D.V., Kotyan, S., Matsuki, M.: Representation quality explains adversarial attacks. Preprint arXiv:1906.06627 (2019)"},{"key":"15_CR45","unstructured":"Vargas, D.V., Kotyan, S.: Evolving robust neural architectures to defend from adversarial attacks (2019). Preprint arXiv:1906.11667"},{"key":"15_CR46","unstructured":"Negrinho, R., Gordon, G.: DeepArchitect: Automatically designing and training deep architectures (2017). Preprint arXiv:1704.08792"},{"key":"15_CR47","unstructured":"Brock, A., Lim, T., Ritchie, J.M., Weston, N.: Smash: One-shot model architecture search through hypernetworks (2017). Preprint arXiv:1708.05344"},{"issue":"1","key":"15_CR48","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s12065-007-0002-4","volume":"1","author":"D Floreano","year":"2008","unstructured":"Floreano, D., D\u00fcrr, P., Mattiussi, C.: Neuroevolution: from architectures to learning. Evol. Intell. 1(1), 47\u201362 (2008)","journal-title":"Evol. Intell."},{"issue":"8","key":"15_CR49","doi-asserted-by":"crossref","first-page":"1759","DOI":"10.1109\/TNNLS.2016.2551748","volume":"28","author":"DV Vargas","year":"2017","unstructured":"Vargas, D.V., Murata, J.: Spectrum-diverse neuroevolution with unified neural models. IEEE Trans. Neural Netw. Learn. Syst. 28(8), 1759\u20131773 (2017)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"15_CR50","doi-asserted-by":"crossref","unstructured":"Vargas, D.V., Takano, H., Murata, J.: Self organizing classifiers and niched fitness. In: Proceedings of the Fifteenth Annual Conference on Genetic and Evolutionary Computation Conference, pp. 1109\u20131116. ACM, New York (2013)","DOI":"10.1145\/2463372.2463501"},{"key":"15_CR51","doi-asserted-by":"crossref","unstructured":"Vargas, D.V., Takano, H., Murata, J.: Novelty-organizing team of classifiers-a team-individual multi-objective approach to reinforcement learning. In: 2014 Proceedings of the SICE Annual Conference (SICE), pp. 1785\u20131792. IEEE, Piscataway (2014)","DOI":"10.1109\/SICE.2014.6935299"},{"key":"15_CR52","doi-asserted-by":"crossref","unstructured":"Vargas, D.V., Takano, H., Murata, J.: Novelty-organizing team of classifiers in noisy and dynamic environments. In: 2015 IEEE Congress on Evolutionary Computation (CEC), pp. 2937\u20132944. IEEE, Piscataway (2015)","DOI":"10.1109\/CEC.2015.7257254"},{"issue":"2","key":"15_CR53","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s12065-013-0095-x","volume":"6","author":"DV Vargas","year":"2013","unstructured":"Vargas, D.V., Takano, H., Murata, J.: Self organizing classifiers: first steps in structured evolutionary machine learning. Evol. Intel. 6(2), 57\u201372 (2013)","journal-title":"Evol. Intel."}],"container-title":["Natural Computing Series","Deep Neural Evolution"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-3685-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,20]],"date-time":"2020-05-20T15:26:05Z","timestamp":1589988365000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-3685-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811536847","9789811536854"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-3685-4_15","relation":{},"ISSN":["1619-7127"],"issn-type":[{"type":"print","value":"1619-7127"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"21 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}