{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:44:46Z","timestamp":1742975086792,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819722419"},{"type":"electronic","value":"9789819722426"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-2242-6_10","type":"book-chapter","created":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T09:02:31Z","timestamp":1713949351000},"page":"117-129","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SASBO: Sparse Attack via\u00a0Stochastic Binary Optimization"],"prefix":"10.1007","author":[{"given":"Yihan","family":"Meng","sequence":"first","affiliation":[]},{"given":"Weitao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Shang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,25]]},"reference":[{"key":"10_CR1","unstructured":"Bird, T., Kunze, J., Barber, D.: Stochastic variational optimization. arXiv preprint arXiv:1809.04855 (2018)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: SP, pp. 39\u201357. IEEE (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Croce, F., Hein, M.: Sparse and imperceivable adversarial attacks. In: ICCV, pp. 4723\u20134731. IEEE (2019)","DOI":"10.1109\/ICCV.2019.00482"},{"key":"10_CR4","unstructured":"Croce, F., Hein, M.: Mind the box: l$${}_{\\text{1}}$$-APGD for sparse adversarial attacks on image classifiers. In: ICML, pp. 2201\u20132211. PMLR (2021)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: CVPR, pp. 248\u2013255. IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"10_CR6","unstructured":"Dong, X., et al.: GreedyFool: distortion-aware sparse adversarial attack. In: NeurIPS, pp. 11226\u201311236 (2020)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-030-58542-6_3","volume-title":"Computer Vision \u2013 ECCV 2020","author":"Y Fan","year":"2020","unstructured":"Fan, Y., et al.: Sparse adversarial attack via perturbation factorization. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12367, pp. 35\u201350. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58542-6_3"},{"key":"10_CR8","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: ICLR (2015)"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-319-46466-4_15","volume-title":"Computer Vision \u2013 ECCV 2016","author":"A Gordo","year":"2016","unstructured":"Gordo, A., Almaz\u00e1n, J., Revaud, J., Larlus, D.: Deep image retrieval: learning global representations for image search. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9910, pp. 241\u2013257. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46466-4_15"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: CVPR, pp. 770\u2013778. IEEE (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"10_CR11","unstructured":"Krizhevsky, A., Hinton, G., et\u00a0al.: Learning multiple layers of features from tiny images. In: Handbook of Systemic Autoimmune Diseases (2009)"},{"key":"10_CR12","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial machine learning at scale. In: ICLR (2017)"},{"key":"10_CR13","unstructured":"Lin, M., Chen, Q., Yan, S.: Network in network. In: ICLR (2014)"},{"key":"10_CR14","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: ICLR (2018)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Modas, A., Moosavi-Dezfooli, S.M., Frossard, P.: SparseFool: a few pixels make a big difference. In: CVPR, pp. 9087\u20139096. IEEE (2019)","DOI":"10.1109\/CVPR.2019.00930"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z.B., Swami, A.: The limitations of deep learning in adversarial settings. In: EuroSP, pp. 372\u2013387 (2016)","DOI":"10.1109\/EuroSP.2016.36"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: ICLR (2015)","DOI":"10.1109\/ICCV.2015.314"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Su, J., Vargas, D.V., Sakurai, K.: One pixel attack for fooling deep neural networks. TEVC (2019)","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"10_CR19","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: ICLR (2014)"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Yang, H., Ciftci, U.A., Yin, L.: Facial expression recognition by de-expression residue learning. In: CVPR, pp. 2168\u20132177. IEEE (2018)","DOI":"10.1109\/CVPR.2018.00231"},{"key":"10_CR21","unstructured":"Yin, M., Zhou, M.: ARM: augment-reinforce-merge gradient for stochastic binary networks. In: ICLR (2019)"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Zhao, P., Liu, S., Wang, Y., Lin, X.: An ADMM-based universal framework for adversarial attacks on deep neural networks. In: ACM MM. ACM (2018)","DOI":"10.1145\/3240508.3240639"},{"key":"10_CR23","unstructured":"Zhu, M., Chen, T., Wang, Z.: Sparse and imperceptible adversarial attack via a homotopy algorithm. In: ICML, pp. 12868\u201312877. PMLR (2021)"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Zoph, B., Vasudevan, V., Shlens, J., Le, Q.V.: Learning transferable architectures for scalable image recognition. In: CVPR, pp. 8697\u20138710. IEEE (2018)","DOI":"10.1109\/CVPR.2018.00907"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-2242-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T23:01:06Z","timestamp":1731798066000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-2242-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819722419","9789819722426"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-2242-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"25 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taipei","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 May 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 May 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pakdd2024.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}