{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T02:53:46Z","timestamp":1768272826301,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819556755","type":"print"},{"value":"9789819556762","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5676-2_39","type":"book-chapter","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T20:32:34Z","timestamp":1768249954000},"page":"581-595","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["STAF: Symbol-Targeted Adversarial Flow for\u00a0Handwritten Mathematical Expression Recognition"],"prefix":"10.1007","author":[{"given":"Xiangshu","family":"Ruan","sequence":"first","affiliation":[]},{"given":"Mingyu","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Yijian","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,13]]},"reference":[{"key":"39_CR1","doi-asserted-by":"crossref","unstructured":"Bayram, S., Barner, K.: A black-box attack on optical character recognition systems. In: Computer Vision and Machine Intelligence: Proceedings of CVMI 2022, pp. 221\u2013231. Springer (2023)","DOI":"10.1007\/978-981-19-7867-8_18"},{"key":"39_CR2","unstructured":"Brown, T.B., Man\u00e9, D., Roy, A., Abadi, M., Gilmer, J.: Adversarial patch. arXiv preprint arXiv:1712.09665 (2017)"},{"key":"39_CR3","unstructured":"Chen, K., Shen, H., Zhong, L., Chen, M.: MMHMER: multi-viewer and multi-task for handwritten mathematical expression recognition. arXiv preprint arXiv:2502.05557 (2025)"},{"key":"39_CR4","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/978-3-030-67664-3_33","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"L Chen","year":"2021","unstructured":"Chen, L., Sun, J., Xu, W.: FAWA: fast adversarial watermark attack on optical character recognition (OCR) systems. In: Hutter, F., Kersting, K., Lijffijt, J., Valera, I. (eds.) ECML PKDD 2020, Part III. LNCS (LNAI), vol. 12459, pp. 547\u2013563. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-67664-3_33"},{"key":"39_CR5","unstructured":"Chung, J., Gulcehre, C., Cho, K., Bengio, Y.: Empirical evaluation of gated recurrent neural networks on sequence modeling. arxiv 2014. arXiv preprint arXiv:1412.3555 (2014). 1412"},{"key":"39_CR6","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1016\/j.patrec.2019.06.028","volume":"125","author":"T Deng","year":"2019","unstructured":"Deng, T., Zeng, Z.: Generate adversarial examples by spatially perturbing on the meaningful area. Pattern Recogn. Lett. 125, 632\u2013638 (2019)","journal-title":"Pattern Recogn. Lett."},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Dong, Y., et al.: Boosting adversarial attacks with momentum. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 9185\u20139193 (2018)","DOI":"10.1109\/CVPR.2018.00957"},{"key":"39_CR8","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"issue":"8","key":"39_CR9","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"39_CR10","unstructured":"Jaderberg, M., Simonyan, K., Zisserman, A., et\u00a0al.: Spatial transformer networks. Adv. Neural Inf. Process. Syst. 28 (2015)"},{"key":"39_CR11","unstructured":"Jia, Y., Lu, Y., Velipasalar, S., Zhong, Z., Wei, T.: Enhancing cross-task transferability of adversarial examples with dispersion reduction. arXiv preprint arXiv:1905.03333 (2019)"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Li, C., Yang, Y., Lin, J., Zhan, R.: An improved adversarial example generating method with optimized spatial transfrom. In: 2020 IEEE International Conference on Progress in Informatics and Computing (PIC), pp. 173\u2013178. IEEE (2020)","DOI":"10.1109\/PIC50277.2020.9350850"},{"key":"39_CR13","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"Mahdavi, M., Zanibbi, R., Mouchere, H., Viard-Gaudin, C., Garain, U.: ICDAR 2019 CROHME+ TFD: competition on recognition of handwritten mathematical expressions and typeset formula detection. In: 2019 International Conference on Document Analysis and Recognition (ICDAR), pp. 1533\u20131538. IEEE (2019)","DOI":"10.1109\/ICDAR.2019.00247"},{"key":"39_CR15","doi-asserted-by":"crossref","unstructured":"Mouchere, H., Viard-Gaudin, C., Zanibbi, R., Garain, U.: ICFHR 2014 competition on recognition of on-line handwritten mathematical expressions (CROHME 2014). In: 2014 14th International Conference on Frontiers in Handwriting Recognition, pp. 791\u2013796. IEEE (2014)","DOI":"10.1109\/ICFHR.2014.138"},{"key":"39_CR16","doi-asserted-by":"crossref","unstructured":"Mouch\u00e8re, H., Viard-Gaudin, C., Zanibbi, R., Garain, U.: ICFHR2016 CROHME: competition on recognition of online handwritten mathematical expressions. In: 2016 15th International Conference on Frontiers in Handwriting Recognition (ICFHR), pp. 607\u2013612. IEEE (2016)","DOI":"10.1109\/ICFHR.2016.0116"},{"issue":"8","key":"39_CR17","doi-asserted-by":"publisher","first-page":"11627","DOI":"10.1007\/s10586-024-04513-4","volume":"27","author":"C Vizcarra","year":"2024","unstructured":"Vizcarra, C., et al.: Deep learning adversarial attacks and defenses on license plate recognition system. Clust. Comput. 27(8), 11627\u201311644 (2024)","journal-title":"Clust. Comput."},{"key":"39_CR18","unstructured":"Xiao, C., Zhu, J.Y., Li, B., He, W., Liu, M., Song, D.: Spatially transformed adversarial examples. arXiv preprint arXiv:1801.02612 (2018)"},{"key":"39_CR19","doi-asserted-by":"crossref","unstructured":"Xu, X., Chen, J., Xiao, J., Gao, L., Shen, F., Shen, H.T.: What machines see is not what they get: fooling scene text recognition models with adversarial text images. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 12304\u201312314 (2020)","DOI":"10.1109\/CVPR42600.2020.01232"},{"key":"39_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, J., Du, J., Dai, L.: Multi-scale attention with dense encoder for handwritten mathematical expression recognition. In: 2018 24th International Conference on Pattern Recognition (ICPR), pp. 2245\u20132250. IEEE (2018)","DOI":"10.1109\/ICPR.2018.8546031"},{"key":"39_CR21","unstructured":"Zhang, J., Du, J., Yang, Y., Song, Y.Z., Wei, S., Dai, L.: A tree-structured decoder for image-to-markup generation. In: International Conference on Machine Learning, pp. 11076\u201311085. PMLR (2020)"},{"key":"39_CR22","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.patcog.2017.06.017","volume":"71","author":"J Zhang","year":"2017","unstructured":"Zhang, J., et al.: Watch, attend and parse: an end-to-end neural network based approach to handwritten mathematical expression recognition. Pattern Recogn. 71, 196\u2013206 (2017)","journal-title":"Pattern Recogn."},{"key":"39_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-319-46493-0_18","volume-title":"Computer Vision \u2013 ECCV 2016","author":"T Zhou","year":"2016","unstructured":"Zhou, T., Tulsiani, S., Sun, W., Malik, J., Efros, A.A.: View synthesis by appearance flow. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016, Part IV. LNCS, vol. 9908, pp. 286\u2013301. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46493-0_18"},{"key":"39_CR24","doi-asserted-by":"crossref","unstructured":"Zhu, J., Gao, L., Zhao, W.: ICAL: implicit character-aided learning for enhanced handwritten mathematical expression recognition. In: International Conference on Document Analysis and Recognition, pp. 21\u201337. Springer (2024)","DOI":"10.1007\/978-3-031-70549-6_2"},{"key":"39_CR25","doi-asserted-by":"crossref","unstructured":"Zhu, J., Zhao, W., Li, Y., Hu, X., Gao, L.: TAMER: tree-aware transformer for handwritten mathematical expression recognition. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a039, pp. 10950\u201310958 (2025)","DOI":"10.1609\/aaai.v39i10.33190"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5676-2_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T20:32:37Z","timestamp":1768249957000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5676-2_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819556755","9789819556762"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5676-2_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"13 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2025.prcv.cn\/index.asp","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}