{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T01:01:07Z","timestamp":1760576467790,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":26,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819531813","type":"print"},{"value":"9789819531820","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3182-0_2","type":"book-chapter","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:17:29Z","timestamp":1760555849000},"page":"24-37","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DMD: Boosting Adversarial Transferability via Dynamic Momentum Decay"],"prefix":"10.1007","author":[{"given":"Haolang","family":"Feng","sequence":"first","affiliation":[]},{"given":"Yuling","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Dou","sequence":"additional","affiliation":[]},{"given":"Rou","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Long","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"issue":"6","key":"2_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. Commun. ACM 60(6), 84\u201390 (2017)","journal-title":"Commun. ACM"},{"key":"2_CR2","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556, 2014"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Nguyen, X.B., Duong, C.N., Li, X., et al.: Micron-bert: bert-based facial micro-expression recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1482\u20131492, 2023","DOI":"10.1109\/CVPR52729.2023.00149"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Li, Y., Li, Y., Dai, X., et al.: Physical-world optical adversarial attacks on 3d face recognition. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 24699\u201324708, 2023","DOI":"10.1109\/CVPR52729.2023.02366"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Jiang, B., Chen, S., Xu, Q., et al.: Vad: vectorized scene representation for efficient autonomous driving. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 8340\u20138350, 2023","DOI":"10.1109\/ICCV51070.2023.00766"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Jia, X., Gao, Y., Chen, L., et al.: Driveadapter: breaking the coupling barrier of perception and planning in end-to-end autonomous driving. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 7953\u20137963, 2023","DOI":"10.1109\/ICCV51070.2023.00731"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Dong, Y., Liao, F., Pang, T., et al.: Boosting adversarial attacks with momentum. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 9185\u20139193, 2018","DOI":"10.1109\/CVPR.2018.00957"},{"key":"2_CR8","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572, 2014"},{"key":"2_CR9","unstructured":"Lin, J., Song, C., He, K., et al.: Nesterov accelerated gradient and scale invariance for adversarial attacks. arXiv preprint arXiv:1908.06281, 2019"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Wang, X., He, K.: Enhancing the transferability of adversarial attacks through variance tuning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1924\u20131933, 2021","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"2_CR11","unstructured":"Wang, G., Wei, X., Yan, H.: Improving adversarial transferability with spatial momentum. arXiv preprint arXiv:2203.13479, 2022"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Dong, Y., Pang, T., Su, H., et al.: Evading defenses to transferable adversarial examples by translation-invariant attacks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4312\u20134321, 2019","DOI":"10.1109\/CVPR.2019.00444"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Xie, C., Zhang, Z., Zhou, Y., et al.: Improving transferability of adversarial examples with input diversity. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2730\u20132739, 2019","DOI":"10.1109\/CVPR.2019.00284"},{"key":"2_CR14","unstructured":"Zhang, H., Yao, Z., Sakurai, K.: Versatile defense against adversarial attacks on image recognition. arXiv preprint arXiv:2403.08170, 2024"},{"key":"2_CR15","unstructured":"Tram\u00e8r, F., Kurakin, A., Papernot, N., et al.: Ensemble adversarial training: attacks and defenses. arXiv preprint arXiv:1705.07204, 2017"},{"key":"2_CR16","unstructured":"Shafahi, A., Najibi, M., Ghiasi, M.A., et al.: Adversarial training for free! Adv. Neural Inf. Process. Syst. 32 (2019)"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Gokhale, T., Anirudh, R., Kailkhura, B., et al.: Attribute-guided adversarial training for robustness to natural perturbations. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, no. 9, pp. 7574\u20137582, 2021","DOI":"10.1609\/aaai.v35i9.16927"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Naseer, M., Khan, S., Hayat, M., et al.: A self-supervised approach for adversarial robustness. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 262\u2013271, 2020","DOI":"10.1109\/CVPR42600.2020.00034"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Xu, W., Evans, D., Qi, Y.: Feature squeezing: detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155, 2017","DOI":"10.14722\/ndss.2018.23198"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Liu, Z., Liu, Q., Liu, T., et al.: Feature distillation: dnn-oriented jpeg compression against adversarial examples. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, pp. 860\u2013868, 2019","DOI":"10.1109\/CVPR.2019.00095"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial Examples in the Physical World. Artificial Intelligence Safety and Security, pp. 99\u2013112. Chapman and Hall\/CRC, London, 2018","DOI":"10.1201\/9781351251389-8"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., et al.: Grad-cam: visual explanations from deep networks via gradient-based localization. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 618\u2013626, 2017","DOI":"10.1109\/ICCV.2017.74"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., et al.: Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2818\u20132826, 2016","DOI":"10.1109\/CVPR.2016.308"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Ioffe, S., Vanhoucke, V., et al.: Inception-v4, inception-resnet and the impact of residual connections on learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, p. 31, no. 1 (2017)","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., et al.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778, 2016","DOI":"10.1109\/CVPR.2016.90"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Long, S., Tao, W., Lei, J., et al.: On the convergence of an adaptive momentum method for adversarial attacks. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 38, no. 13, pp. 14132\u201314140, 2024","DOI":"10.1609\/aaai.v38i13.29323"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3182-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:17:35Z","timestamp":1760555855000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3182-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"ISBN":["9789819531813","9789819531820"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3182-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"15 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dspp2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}