{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:50:36Z","timestamp":1742939436312,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819981779"},{"type":"electronic","value":"9789819981786"}],"license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8178-6_8","type":"book-chapter","created":{"date-parts":[[2023,11,29]],"date-time":"2023-11-29T10:02:54Z","timestamp":1701252174000},"page":"97-108","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Neuron Attribution-Based Attacks Fooling Object Detectors"],"prefix":"10.1007","author":[{"given":"Guoqiang","family":"Shi","sequence":"first","affiliation":[]},{"given":"Anjie","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Wenxin","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp.770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"8_CR2","unstructured":"Redmon, J., Farhadi, A.: YOLOv3: An incremental improvement.\u00a0arXiv preprint arXiv:1804.02767 (2018)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-Net: Convolutional networks for biomedical image segmentation. In:\u00a0Medical Image Computing and Computer-Assisted Intervention\u2013MICCAI 2015, pp. 234\u2013241 (2015)","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"8_CR4","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Xie, C., Wang, J., Zhang, Z., Zhou, Y., Xie, L., Yuille, A.: Adversarial examples for semantic segmentation and object detection. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 1369\u20131378 (2017)","DOI":"10.1109\/ICCV.2017.153"},{"key":"8_CR6","unstructured":"Liu, X., Yang, H., Liu, Z., Song, L., Li, H., Chen, Y.: DPATCH: An adversarial patch attack on object detectors.\u00a0arXiv preprint arXiv:1806.02299 (2018)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Waseda, F., Nishikawa, S., Le, T.N., Nguyen, H.H., Echizen, I.: Closer look at the transferability of adversarial examples: how they fool different models differently. In:\u00a0Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 1360\u20131368 (2023)","DOI":"10.1109\/WACV56688.2023.00141"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, C., Benz, P., Karjauv, A., Cho, J.W., Zhang, K., Kweon, I.S.: Investigating top-k white-box and transferable black-box attack. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 15085\u201315094 (2022)","DOI":"10.1109\/CVPR52688.2022.01466"},{"key":"8_CR9","unstructured":"Tram\u00e8r, F., Kurakin, A., Papernot, N., Goodfellow, I., Boneh, D., McDaniel, P.: Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204 (2017)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Chow, K.H., Liu, L., Gursoy, M.E., Truex, S., Wei, W., Wu, Y.: TOG: targeted adversarial objectness gradient attacks on real-time object detection systems.\u00a0arXiv preprint arXiv:2004.04320 (2020)","DOI":"10.1109\/TPS-ISA50397.2020.00042"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Liao, Q., Wang, X., Kong, B., Lyu, S., Zhu, B., Yin, Y., Wu, X.: Transferable adversarial examples for anchor free object detection. In: 2021 IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136. (2021)","DOI":"10.1109\/ICME51207.2021.9428301"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Huang, H., Chen, Z., Chen, H., Wang, Y., Zhang, K.: T-SEA: transfer-based self-ensemble attack on object detection. In:\u00a0Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 20514\u201320523 (2023)","DOI":"10.1109\/CVPR52729.2023.01965"},{"key":"8_CR13","unstructured":"Lu, J., Sibai, H., Fabry, E.: Adversarial examples that fool detectors. arXiv preprint arXiv:1712.02494 (2017)"},{"key":"8_CR14","unstructured":"Li, Y., Tian, D., Chang, M.C., Bian, X., Lyu, S.: Robust adversarial perturbation on deep proposal-based models. arXiv preprint arXiv:1809.05962 (2018)"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, H., Zhou, W., Li, H.: Contextual adversarial attacks for object detection. In: 2020 IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136 (2020)","DOI":"10.1109\/ICME46284.2020.9102805"},{"key":"8_CR16","unstructured":"Wu, X., Huang, L., Gao, C., Lee, W. S., Suzuki, T.: G-UAP: generic universal adversarial perturbation that fools RPN-based detectors. In: ACML, pp. 1204\u20131217 (2019)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Chen, S.T., Cornelius, C., Martin, J., Chau, D.H.: Shapeshifter: Robust physical adversarial attack on faster R-CNN object detector. In: Machine learning and knowledge discovery in databases: European Conference, ECML PKDD, pp. 52\u201368 (2019)","DOI":"10.1007\/978-3-030-10925-7_4"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Shi, G., Peng, A., Zeng, H.: An enhanced transferable adversarial attack against object detection. In: International Joint Conference on Neural Networks. in press (2023)","DOI":"10.1109\/IJCNN54540.2023.10190995"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Wang, D., Li, C., Wen, S., Han, Q.L., Nepal, S., Zhang, X., Xiang, Y.: Daedalus: breaking non-maximum suppression in object detection via adversarial examples.\u00a0In: IEEE Trans. Cybern. 52(8), pp.7427\u20137440 (2021)","DOI":"10.1109\/TCYB.2020.3041481"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Ganeshan, A., BS, V., Babu, R. V.: FDA: feature disruptive attack. In:\u00a0Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 8069\u20138079 (2019)","DOI":"10.1109\/ICCV.2019.00816"},{"key":"8_CR21","unstructured":"Naseer, M., Khan, S. H., Rahman, S., Porikli, F.: Task-generalizable adversarial attack based on perceptual metric. arXiv preprint arXiv:1811.09020 (2018)"},{"key":"8_CR22","unstructured":"Dhamdhere, K., Sundararajan, M., Yan, Q.: How important is a neuron? arXiv preprint arXiv:1805.12233 (2018)"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, J., Wu, W., Huang, J.T., Huang, Y., Wang, W., Su, Y., Lyu, M.R.: Improving adversarial transferability via neuron attribution-based attacks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp.14993\u201315002 (2022)","DOI":"10.1109\/CVPR52688.2022.01457"},{"key":"8_CR24","unstructured":"Ren, S., He, K., Girshick, R., Sun, J.: Faster R-CNN: towards real-time object detection with region proposal networks.\u00a0In: Advances in Neural Information Processing Systems, vol. 28 (2015)"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed, S., Fu, C.Y., Berg, A.C.: SSD: single shot multibox detector. In: ECCV 2016, pp. 21\u201337 (2016)","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In:\u00a02017 IEEE Symposium on Security and Privacy, pp. 39\u201357 (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"8_CR27","unstructured":"Athalye, A., Engstrom, L., Ilyas, A., Kwok, K.: Synthesizing robust adversarial examples. In: International Conference on Machine Learning PMLR, pp. 284\u2013293 (2018)"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Zhu, X., Lyu, S., Wang, X., Zhao, Q.: TPH-YOLOv5: Improved YOLOv5 based on transformer prediction head for object detection on drone-captured scenarios. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 2778\u20132788 (2021)","DOI":"10.1109\/ICCVW54120.2021.00312"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Lin, T., Doll\u00e1r, P., Girshick, R., He, K., Hariharan, B., Belongie, S.: Feature pyramid networks for object detection. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 936\u2013944 (2016)","DOI":"10.1109\/CVPR.2017.106"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"He, K., Gkioxari, G., Doll\u00e1r, P., Grishick, R.: Mask R-CNN. IEEE Trans. Pattern Anal. Mach. Intell. 42, 386\u2013397 (2017)","DOI":"10.1109\/TPAMI.2018.2844175"},{"key":"8_CR31","unstructured":"Liu, X., Yang, H., Liu, Z., Song, L., Chen, Y., Li, H.H.: DPATCH: an adversarial patch attack on object detectors. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2018)"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Hu, Z., Huang, S., Zhu, X., Sun, F., Zhang, B., Hu, X.: Adversarial texture for fooling person detectors in the physical world. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 307\u2013316 (2022)","DOI":"10.1109\/CVPR52688.2022.01295"}],"container-title":["Communications in Computer and Information Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8178-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T16:27:48Z","timestamp":1709828868000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8178-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"ISBN":["9789819981779","9789819981786"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8178-6_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"30 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Changsha","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iconip2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1274","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"650","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"51% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.14","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.46","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}