{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:07:06Z","timestamp":1742980026180,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819785391"},{"type":"electronic","value":"9789819785407"}],"license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8540-7_15","type":"book-chapter","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T10:01:56Z","timestamp":1729159316000},"page":"244-259","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Targeted Universal Adversarial Attack Based on\u00a0Fourier Transform"],"prefix":"10.1007","author":[{"given":"Yancheng","family":"Sun","sequence":"first","affiliation":[]},{"given":"Yuling","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ziyang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Dou","sequence":"additional","affiliation":[]},{"given":"Chaoyue","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,18]]},"reference":[{"key":"15_CR1","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: ICLR (2014)"},{"key":"15_CR2","unstructured":"Goodfellow, I., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: ICLR (2015)"},{"key":"15_CR3","doi-asserted-by":"publisher","unstructured":"Dong, Y., et al.: Boosting adversarial attacks with momentum. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT (2018). https:\/\/doi.org\/10.1109\/cvpr.2018.00957","DOI":"10.1109\/cvpr.2018.00957"},{"key":"15_CR4","unstructured":"Lin, J., Song, C., He, K., Wang, L., Hopcroft, J.E.: Nesterov accelerated gradient and scale invariance for adversarial attacks. In: ICLR (2020)"},{"key":"15_CR5","doi-asserted-by":"publisher","unstructured":"Wang, X., He, K.: Enhancing the transferability of adversarial attacks through variance tuning. In: 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA (2021). https:\/\/doi.org\/10.1109\/cvpr46437.2021.00196","DOI":"10.1109\/cvpr46437.2021.00196"},{"key":"15_CR6","unstructured":"Geirhos, R., Rubisch, P., Michaelis, C., Bethge, M., Wichmann, F.A., Brendel, W.: ImageNet-trained CNNs are biased towards texture; increasing shape bias improves accuracy and robustness. In: International Conference on Learning Representations, ICLR (2018)"},{"key":"15_CR7","unstructured":"Naseer, M.M., Ranasinghe, K., Khan, S., Hayat, M., Khan, F.S., Yang, M.-H.: Intriguing properties of vision transformers. In: Neural Information Processing Systems (2021)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Wei, Z., Chen, J., Wu, Z., Jiang, Y.-G.: Enhancing the self-universality for transferable targeted attacks. In: 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2023)","DOI":"10.1109\/CVPR52729.2023.01182"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Long, Y., et al.: Frequency domain model augmentation for adversarial attack (2022)","DOI":"10.1007\/978-3-031-19772-7_32"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Duan, R., Chen, Y., Niu, D., Ye, Y., Qin, A.K., He, Y.: AdvDrop: adversarial attack to DNNs by dropping information. In: 2021 IEEE\/CVF International Conference on Computer Vision (ICCV), Montreal, QC, Canada (2021). http:\/\/dx.doi.org\/10.1109\/iccv48922.2021.00741","DOI":"10.1109\/ICCV48922.2021.00741"},{"key":"15_CR11","doi-asserted-by":"publisher","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA (2017). https:\/\/doi.org\/10.1109\/sp.2017.49","DOI":"10.1109\/sp.2017.49"},{"key":"15_CR12","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: International Conference on Learning Representations,International Conference on Learning Representations (2018)"},{"key":"15_CR13","doi-asserted-by":"publisher","unstructured":"Xu, W., Evans, D., Qi, Y.: Feature squeezing: detecting adversarial examples in deep neural networks. In: Proceedings 2018 Network and Distributed System Security Symposium (2018). https:\/\/doi.org\/10.14722\/ndss.2018.23198","DOI":"10.14722\/ndss.2018.23198"},{"key":"15_CR14","unstructured":"Zhang, H., Yu, Y., Jiao, J., Xing, E.P., El Ghaoui, L., Jordan, M.I.: Theoretically principled trade-off between robustness and accuracy. In: International Conference on Machine Learning (2019)"},{"key":"15_CR15","unstructured":"Croce, F., Hein, M.: Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In: International Conference on Machine Learning (ICML), pp. 2206\u20132216 (2020)"},{"key":"15_CR16","doi-asserted-by":"publisher","unstructured":"Wu, T., Liu, Z., Huang, Q., Wang, Y., Lin, D.: Adversarial robustness under longtailed distribution. In: 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA (2021). https:\/\/doi.org\/10.1109\/cvpr46437.2021.00855","DOI":"10.1109\/cvpr46437.2021.00855"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Kim, J., Lee, B.-K., Ro, Y.M.: Demystifying causal features on adversarial examples and causal inoculation for robust network by adversarial instrumental variable regression. In: CVPR 2023, pp. 12032\u201312042 (2023)","DOI":"10.1109\/CVPR52729.2023.01184"},{"key":"15_CR18","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2304\u20132311 (2014)"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8540-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T10:05:14Z","timestamp":1729159514000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8540-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"ISBN":["9789819785391","9789819785407"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8540-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,18]]},"assertion":[{"value":"18 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}