{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T10:57:43Z","timestamp":1768993063580,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":43,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819556922","type":"print"},{"value":"9789819556939","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5693-9_5","type":"book-chapter","created":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T21:22:40Z","timestamp":1768944160000},"page":"62-76","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Boosting Adversarial Transferability via\u00a0Commonality-Oriented Gradient Optimization"],"prefix":"10.1007","author":[{"given":"Yanting","family":"Gao","sequence":"first","affiliation":[]},{"given":"Yepeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Junming","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hongyun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Duoqian","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Cairong","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,21]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Chen, Z., Xie, L., Niu, J., Liu, X., Wei, L., Tian, Q.: Visformer: The vision-friendly transformer. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 589\u2013598 (2021)","DOI":"10.1109\/ICCV48922.2021.00063"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Dong, Y., et al.: Boosting adversarial attacks with momentum. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 9185\u20139193 (2018)","DOI":"10.1109\/CVPR.2018.00957"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Dong, Y., Pang, T., Su, H., Zhu, J.: Evading defenses to transferable adversarial examples by translation-invariant attacks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4312\u20134321 (2019)","DOI":"10.1109\/CVPR.2019.00444"},{"key":"5_CR4","unstructured":"Dosovitskiy, A., et al.: An image is worth 16x16 words: Transformers for image recognition at scale. ICLR (2021)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"d\u2019Ascoli, S., Touvron, H., Leavitt, M.L., Morcos, A.S., Biroli, G., Sagun, L.: Convit: Improving vision transformers with soft convolutional inductive biases. In: International Conference on Machine Learning, pp. 2286\u20132296. PMLR (2021)","DOI":"10.1088\/1742-5468\/ac9830"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Fu, K., et al.: Dual focus-attention transformer for robust point cloud registration. In: Proceedings of the Computer Vision and Pattern Recognition Conference, pp. 11769\u201311778 (2025)","DOI":"10.1109\/CVPR52734.2025.01099"},{"key":"5_CR7","unstructured":"Goodfellow, I.J.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-030-58610-2_15","volume-title":"Computer Vision \u2013 ECCV 2020","author":"A Hamdi","year":"2020","unstructured":"Hamdi, A., Rojas, S., Thabet, A., Ghanem, B.: AdvPC: transferable adversarial perturbations on 3D point clouds. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12357, pp. 241\u2013257. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58610-2_15"},{"key":"5_CR9","first-page":"15908","volume":"34","author":"K Han","year":"2021","unstructured":"Han, K., Xiao, A., Wu, E., Guo, J., Xu, C., Wang, Y.: Transformer in transformer. Adv. Neural. Inf. Process. Syst. 34, 15908\u201315919 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Heo, B., Yun, S., Han, D., Chun, S., Choe, J., Oh, S.J.: Rethinking spatial dimensions of vision transformers. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 11936\u201311945 (2021)","DOI":"10.1109\/ICCV48922.2021.01172"},{"key":"5_CR12","unstructured":"Inkawhich, N., Liang, K.J., Carin, L., Chen, Y.: Transferable perturbations of deep feature distributions. arXiv preprint arXiv:2004.12519 (2020)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Kim, G., Kim, J., Lee, J.S.: Exploring adversarial robustness of vision transformers in the spectral perspective. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 3976\u20133985 (2024)","DOI":"10.1109\/WACV57701.2024.00393"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial examples in the physical world. In: Artificial Intelligence Safety and Security, pp. 99\u2013112. Chapman and Hall\/CRC (2018)","DOI":"10.1201\/9781351251389-8"},{"key":"5_CR15","unstructured":"Lin, J., Song, C., He, K., Wang, L., Hopcroft, J.E.: Nesterov accelerated gradient and scale invariance for adversarial attacks. arXiv preprint arXiv:1908.06281 (2019)"},{"key":"5_CR16","unstructured":"Lin, J., et al.: Advances in embodied navigation using large language models: A survey. arXiv preprint arXiv:2311.00530 (2023)"},{"key":"5_CR17","unstructured":"Liu, J., et al.: Aligning vision to language: Text-free multimodal knowledge graph construction for enhanced LLMs reasoning. arXiv preprint arXiv:2503.12972 (2025)"},{"key":"5_CR18","unstructured":"Liu, Y., Chen, X., Liu, C., Song, D.: Delving into transferable adversarial examples and black-box attacks. arXiv preprint arXiv:1611.02770 (2016)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Liu, Z., et al.: Swin transformer: Hierarchical vision transformer using shifted windows. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 10012\u201310022 (2021)","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Long, Y., et al.: Frequency domain model augmentation for adversarial attack. In: European Conference on Computer Vision, pp. 549\u2013566. Springer (2022)","DOI":"10.1007\/978-3-031-19772-7_32"},{"key":"5_CR21","unstructured":"Madry, A.: Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)"},{"key":"5_CR22","first-page":"20887","volume":"37","author":"D Ming","year":"2024","unstructured":"Ming, D., Ren, P., Wang, Y., Feng, X.: Boosting the transferability of adversarial attack on vision transformer with adaptive token tuning. Adv. Neural. Inf. Process. Syst. 37, 20887\u201320918 (2024)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Fawzi, O., Frossard, P.: Universal adversarial perturbations. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1765\u20131773 (2017)","DOI":"10.1109\/CVPR.2017.17"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z.B., Swami, A.: Practical black-box attacks against machine learning. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 506\u2013519 (2017)","DOI":"10.1145\/3052973.3053009"},{"key":"5_CR25","first-page":"12116","volume":"34","author":"M Raghu","year":"2021","unstructured":"Raghu, M., Unterthiner, T., Kornblith, S., Zhang, C., Dosovitskiy, A.: Do vision transformers see like convolutional neural networks? Adv. Neural. Inf. Process. Syst. 34, 12116\u201312128 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"5_CR26","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky, O., et al.: Imagenet large scale visual recognition challenge. Int. J. Comput. Vision 115, 211\u2013252 (2015)","journal-title":"Int. J. Comput. Vision"},{"key":"5_CR27","unstructured":"Shao, R., Shi, Z., Yi, J., Chen, P.Y., Hsieh, C.J.: On the adversarial robustness of vision transformers. arXiv preprint arXiv:2103.15670 (2021)"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Ioffe, S., Vanhoucke, V., Alemi, A.: Inception-v4, inception-resnet and the impact of residual connections on learning. In: Proceedings of the AAAI Conference on Artificial Intelligence. vol.\u00a031 (2017)","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2818\u20132826 (2016)","DOI":"10.1109\/CVPR.2016.308"},{"key":"5_CR30","unstructured":"Touvron, H., Cord, M., Douze, M., Massa, F., Sablayrolles, A., J\u00e9gou, H.: Training data-efficient image transformers & distillation through attention. In: International Conference on Machine Learning, pp. 10347\u201310357. PMLR (2021)"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Touvron, H., Cord, M., Sablayrolles, A., Synnaeve, G., J\u00e9gou, H.: Going deeper with image transformers. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 32\u201342 (2021)","DOI":"10.1109\/ICCV48922.2021.00010"},{"key":"5_CR32","unstructured":"Tram\u00e8r, F., Kurakin, A., Papernot, N., Goodfellow, I., Boneh, D., McDaniel, P.: Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204 (2017)"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Wang, C., Xu, R., Xu, S., Meng, W., Xiao, J., Zhang, X.: Accurate lung nodule segmentation with detailed representation transfer and soft mask supervision. IEEE Trans. Neural Netw. Learn. Syst. (2023)","DOI":"10.1109\/TNNLS.2023.3315271"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Wei, Z., Chen, J., Goldblum, M., Wu, Z., Goldstein, T., Jiang, Y.G.: Towards transferable adversarial attacks on vision transformers. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a036, pp. 2668\u20132676 (2022)","DOI":"10.1609\/aaai.v36i3.20169"},{"key":"5_CR35","unstructured":"Wu, D., Wang, Y., Xia, S.T., Bailey, J., Ma, X.: Skip connections matter: On the transferability of adversarial examples generated with resnets. arXiv preprint arXiv:2002.05990 (2020)"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Wu, J., Xu, R., Wood-Doughty, Z., Wang, C., Xu, S., Lam, E.Y.: Segment anything model is a good teacher for local feature learning. IEEE Trans. Image Process. (2025)","DOI":"10.1109\/TIP.2025.3554033"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Xie, C., et al.: Improving transferability of adversarial examples with input diversity. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2730\u20132739 (2019)","DOI":"10.1109\/CVPR.2019.00284"},{"issue":"10","key":"5_CR38","doi-asserted-by":"publisher","first-page":"6008","DOI":"10.1109\/JBHI.2024.3417247","volume":"28","author":"R Xu","year":"2024","unstructured":"Xu, R., Wang, C., Zhang, J., Xu, S., Meng, W., Zhang, X.: Skinformer: Learning statistical texture representation with transformer for skin lesion segmentation. IEEE J. Biomed. Health Inform. 28(10), 6008\u20136018 (2024)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"5_CR39","doi-asserted-by":"crossref","unstructured":"Xu, R., et al.: Mrftrans: Multimodal representation fusion transformer for monocular 3D semantic scene completion. Inf. Fusion, p. 102493 (2024)","DOI":"10.1016\/j.inffus.2024.102493"},{"key":"5_CR40","doi-asserted-by":"crossref","unstructured":"Zhang, J., Huang, Y., Wu, W., Lyu, M.R.: Transferable adversarial attacks on vision transformers with token gradient regularization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 16415\u201316424 (2023)","DOI":"10.1109\/CVPR52729.2023.01575"},{"key":"5_CR41","unstructured":"Zhang, Y., Liu, Y., Miao, D., Zhang, Q., Shi, Y., Hu, L.: Mg-vit: a multi-granularity method for compact and efficient vision transformers. Adv. Neural Inf. Process. Syst. 36 (2024)"},{"key":"5_CR42","unstructured":"Zhang, Y., et\u00a0al.: Mlip: Efficient multi-perspective language-image pretraining with exhaustive data utilization. arXiv preprint arXiv:2406.01460 (2024)"},{"key":"5_CR43","unstructured":"Zhu, Z., Wang, X., Jin, Z., Zhang, J., Chen, H.: Enhancing transferable adversarial attacks on vision transformers through gradient normalization scaling and high-frequency adaptation. In: The Twelfth International Conference on Learning Representations (2024)"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5693-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T21:22:45Z","timestamp":1768944165000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5693-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819556922","9789819556939"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5693-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"21 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2025.prcv.cn\/index.asp","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}