{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T04:19:38Z","timestamp":1744258778096,"version":"3.40.4"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,11,6]],"date-time":"2022-11-06T00:00:00Z","timestamp":1667692800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,6]],"date-time":"2022-11-06T00:00:00Z","timestamp":1667692800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1552497"],"award-info":[{"award-number":["CCF-1552497"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s00034-022-02226-w","type":"journal-article","created":{"date-parts":[[2022,11,6]],"date-time":"2022-11-06T14:02:45Z","timestamp":1667743365000},"page":"2385-2415","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fooling the Big Picture in Classification Tasks"],"prefix":"10.1007","volume":"42","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5754-5509","authenticated-orcid":false,"given":"Ismail","family":"Alkhouri","sequence":"first","affiliation":[]},{"given":"George","family":"Atia","sequence":"additional","affiliation":[]},{"given":"Wasfy","family":"Mikhael","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,6]]},"reference":[{"key":"2226_CR1","unstructured":"M. Abadi, A. Agarwal, TensorFlow: large-scale machine learning on heterogeneous systems. (Software available from tensorflow.org.) (2015)"},{"issue":"9","key":"2226_CR2","doi-asserted-by":"publisher","first-page":"2203","DOI":"10.1109\/TIFS.2018.2812196","volume":"13","author":"S Akcay","year":"2018","unstructured":"S. Akcay, M.E. Kundegorski, C.G. Willcocks, T.P. Breckon, Using deep convolutional neural network architectures for object classification and detection within X-ray baggage security imagery. IEEE Trans. Inf. Forensics Secur. 13(9), 2203\u20132215 (2018). https:\/\/doi.org\/10.1109\/TIFS.2018.2812196","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2226_CR3","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"N. Akhtar, A. Mian, Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 6, 14410\u201314430 (2018)","journal-title":"IEEE Access"},{"issue":"4","key":"2226_CR4","doi-asserted-by":"publisher","first-page":"1600","DOI":"10.1109\/TCOMM.2016.2529620","volume":"64","author":"PN Alevizos","year":"2016","unstructured":"P.N. Alevizos, Y. Fountzoulas, G.N. Karystinos, A. Bletsas, Log-linear-complexity GLRT-optimal noncoherent sequence detection for orthogonal and RFID-oriented modulations. IEEE Trans. Commun. 64(4), 1600\u20131612 (2016)","journal-title":"IEEE Trans. Commun."},{"key":"2226_CR5","doi-asserted-by":"crossref","unstructured":"I. Alkhouri, G. Atia, W. Mikhael, Adversarial perturbation attacks on glrt-based detectors. In 2020 IEEE international symposium on circuits and systems (ISCAS), pp 1\u20135 (2020a)","DOI":"10.1109\/ISCAS45731.2020.9180821"},{"key":"2226_CR6","doi-asserted-by":"crossref","unstructured":"I. Alkhouri, G.K. Atia, Adversarial attacks on hierarchical composite classifiers via convex programming. In 2020 IEEE 30th international workshop on machine learning for signal processing (MLSP), pages 1\u20136. IEEE (2020)","DOI":"10.1109\/MLSP49062.2020.9231583"},{"key":"2226_CR7","doi-asserted-by":"crossref","unstructured":"I. Alkhouri, Z. Matloub, G. Atia, W. Mikhael, A minimax approach to perturbation attacks on hierarchical image classifiers. In 2020 IEEE 63rd international midwest symposium on circuits and systems (MWSCAS), pp 574\u2013577 (2020b)","DOI":"10.1109\/MWSCAS48704.2020.9184551"},{"key":"2226_CR8","doi-asserted-by":"crossref","unstructured":"E.R. Balda, A. Behboodi, R. Mathar, On generation of adversarial examples using convex programming. In 52nd Asilomar conference on signals, systems, and computers, pp 60\u201365. IEEE (2018)","DOI":"10.1109\/ACSSC.2018.8645290"},{"key":"2226_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-93-86279-04-0","volume-title":"Toeplitz matrices, asymptotic linear algebra and functional analysis","author":"A B\u00f6ttcher","year":"2000","unstructured":"A. B\u00f6ttcher, S.M. Grudsky, Toeplitz matrices, asymptotic linear algebra and functional analysis (Springer, Berlin, 2000)"},{"issue":"1","key":"2226_CR10","first-page":"1","volume":"3","author":"S Boyd","year":"2011","unstructured":"S. Boyd, N. Parikh, E. Chu, B. Peleato, J. Eckstein et al., Distributed optimization and statistical learning via the alternating direction method of multipliers. Found Trends \u00ae Mach. Learn. 3(1), 1\u2013122 (2011)","journal-title":"Found Trends \u00ae Mach. Learn."},{"key":"2226_CR11","unstructured":"J.J. Burred, A. Lerch, A hierarchical approach to automatic musical genre classification. In Proceedings of the 6th international conference on digital audio effects, pp 8\u201311. Citeseer (2003)"},{"key":"2226_CR12","doi-asserted-by":"crossref","unstructured":"N. Carlini, D. Wagner, Towards evaluating the robustness of neural networks. In IEEE Symposium on Security and Privacy (SP), pages 39\u201357 (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"2226_CR13","unstructured":"A. Chakraborty, M. Alam, V. Dey, A. Chattopadhyay, D. Mukhopadhyay, Adversarial attacks and defences: a survey. arXiv preprint arXiv:1810.00069 (2018)"},{"key":"2226_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2945198","author":"C Chen","year":"2019","unstructured":"C. Chen, X. Zhao, M.C. Stamm, Generative adversarial attacks against deep-learning-based camera model identification. IEEE Trans. Inf. Forensics Secur. (2019). https:\/\/doi.org\/10.1109\/TIFS.2019.2945198","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2226_CR15","doi-asserted-by":"crossref","unstructured":"P.-Y. Chen, Y. Sharma, H. Zhang, J. Yi, C.-J. Hsieh, Ead: elastic-net attacks to deep neural networks via adversarial examples. In Proceedings of the AAAI conference on artificial intelligence, 32 (2018)","DOI":"10.1609\/aaai.v32i1.11302"},{"issue":"1","key":"2226_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","volume":"39","author":"AP Dempster","year":"1977","unstructured":"A.P. Dempster, N.M. Laird, D.B. Rubin, Maximum likelihood from incomplete data via the em algorithm. J. Roy. Stat. Soc. Ser. B (Methodol.) 39(1), 1\u201322 (1977)","journal-title":"J. Roy. Stat. Soc. Ser. B (Methodol.)"},{"issue":"83","key":"2226_CR17","first-page":"1","volume":"17","author":"S Diamond","year":"2016","unstructured":"S. Diamond, S. Boyd, CVXPY: a python-embedded modeling language for convex optimization. J. Mach. Learn. Res. 17(83), 1\u20135 (2016)","journal-title":"J. Mach. Learn. Res."},{"key":"2226_CR18","doi-asserted-by":"crossref","unstructured":"Y. Dong, F. Liao, T. Pang, H. Su, J. Zhu, X. Hu, J. Li, Boosting adversarial attacks with momentum. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp 9185\u20139193 (2018)","DOI":"10.1109\/CVPR.2018.00957"},{"key":"2226_CR19","unstructured":"L. Engstrom, A rotation and a translation suffice: fooling CNNs with simple transformations"},{"key":"2226_CR20","unstructured":"L. Engstrom, B. Tran, D. Tsipras, L. Schmidt, A. Madry, Exploring the landscape of spatial robustness. arXiv preprint arXiv:1712.02779 (2017)"},{"issue":"8","key":"2226_CR21","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"T. Fawcett, An introduction to ROC analysis. Pattern Recogn. Lett. 27(8), 861\u2013874 (2006)","journal-title":"Pattern Recogn. Lett."},{"key":"2226_CR22","unstructured":"A. Fawzi, S.-M. Moosavi-Dezfooli, P. Frossard, Robustness of classifiers: from adversarial to random noise. In Advances in neural information processing systems, pp 1632\u20131640 (2016)"},{"key":"2226_CR23","unstructured":"J. Giesen, S. Laue, Distributed convex optimization with many convex constraints. arXiv preprint arXiv:1610.02967 (2016)"},{"issue":"3","key":"2226_CR24","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1590\/0101-7438.2014.034.03.0395","volume":"34","author":"CC Gonzaga","year":"2014","unstructured":"C.C. Gonzaga, E.W. Karas, Complexity of first-order methods for differentiable convex optimization. Pesquisa Operacional 34(3), 395\u2013419 (2014)","journal-title":"Pesquisa Operacional"},{"key":"2226_CR25","unstructured":"I.J. Goodfellow, J. Shlens, C. Szegedy, Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"2226_CR26","doi-asserted-by":"crossref","unstructured":"M.C. Grant, S.P. Boyd, Graph implementations for nonsmooth convex programs. In Recent advances in learning and control, Springer, pp 95\u2013110 (2008)","DOI":"10.1007\/978-1-84800-155-8_7"},{"key":"2226_CR27","volume-title":"Deep learning with Keras","author":"A Gulli","year":"2017","unstructured":"A. Gulli, S. Pal, Deep learning with Keras (Packt Publishing Ltd, Birmingham, 2017)"},{"issue":"2","key":"2226_CR28","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1137\/110836936","volume":"50","author":"B He","year":"2012","unstructured":"B. He, X. Yuan, On the o(1\/n) convergence rate of the douglas-rachford alternating direction method. SIAM J. Numer. Anal. 50(2), 700\u2013709 (2012)","journal-title":"SIAM J. Numer. Anal."},{"issue":"19","key":"2226_CR29","doi-asserted-by":"publisher","first-page":"2238","DOI":"10.3390\/rs11192238","volume":"11","author":"L Jiao","year":"2019","unstructured":"L. Jiao, W. Sun, G. Yang, G. Ren, Y. Liu, A hierarchical classification framework of satellite multispectral\/hyperspectral images for mapping coastal wetlands. Remote Sensing 11(19), 2238 (2019)","journal-title":"Remote Sensing"},{"key":"2226_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2020.105581","volume":"196","author":"AI Khan","year":"2020","unstructured":"A.I. Khan, J.L. Shah, M.M. Bhat, Coronet: a deep neural network for detection and diagnosis of covid-19 from chest x-ray images. Comput. Methods Progr. Biomed. 196, 105581 (2020)","journal-title":"Comput. Methods Progr. Biomed."},{"key":"2226_CR31","unstructured":"D.P. Kingma, J. Ba, Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"issue":"6","key":"2226_CR32","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"A. Krizhevsky, I. Sutskever, G.E. Hinton, Imagenet classification with deep convolutional neural networks. Commun. ACM 60(6), 84\u201390 (2017)","journal-title":"Commun. ACM"},{"key":"2226_CR33","unstructured":"A. Kurakin, I. Goodfellow, S. Bengio, Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533 (2016)"},{"key":"2226_CR34","doi-asserted-by":"crossref","unstructured":"X. Liu, C.-J. Hsieh, Rob-gan: Generator, discriminator, and adversarial attacker. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp 11234\u201311243 (2019)","DOI":"10.1109\/CVPR.2019.01149"},{"key":"2226_CR35","first-page":"2579","volume":"9","author":"LVD Maaten","year":"2008","unstructured":"L.V.D. Maaten, G. Hinton, Visualizing data using t-SNE. J. Mach. Learn. Res. 9, 2579\u20132605 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"2226_CR36","unstructured":"A. Madry, A. Makelov, L. Schmidt, D. Tsipras, A. Vladu, Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 (2017)"},{"issue":"2","key":"2226_CR37","doi-asserted-by":"publisher","first-page":"447","DOI":"10.3390\/s20020447","volume":"20","author":"A Mahmood","year":"2020","unstructured":"A. Mahmood, A.G. Ospina, M. Bennamoun, S. An, F. Sohel, F. Boussaid, R. Hovey, R.B. Fisher, G.A. Kendrick, Automatic hierarchical classification of kelps using deep residual features. Sensors 20(2), 447 (2020)","journal-title":"Sensors"},{"key":"2226_CR38","doi-asserted-by":"crossref","unstructured":"L. McInnes, J. Healy, J. Melville, Umap: Uniform manifold approximation and projection for dimension reduction. arXiv preprint arXiv:1802.03426 (2018)","DOI":"10.21105\/joss.00861"},{"key":"2226_CR39","doi-asserted-by":"crossref","unstructured":"S.-M. Moosavi-Dezfooli, A. Fawzi, P. Frossard, Deepfool: a simple and accurate method to fool deep neural networks. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2574\u20132582 (2016a)","DOI":"10.1109\/CVPR.2016.282"},{"key":"2226_CR40","doi-asserted-by":"crossref","unstructured":"S.-M. Moosavi-Dezfooli, A. Fawzi, P. Frossard, Deepfool: A simple and accurate method to fool deep neural networks. In The IEEE conference on computer vision and pattern recognition (CVPR) (2016b)","DOI":"10.1109\/CVPR.2016.282"},{"key":"2226_CR41","doi-asserted-by":"crossref","unstructured":"N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z.B. Celik, A. Swami, The limitations of deep learning in adversarial settings. In IEEE European symposium on security and privacy (EuroS &P), pages 372\u2013387 (2016)","DOI":"10.1109\/EuroSP.2016.36"},{"issue":"3","key":"2226_CR42","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1561\/2400000003","volume":"1","author":"N Parikh","year":"2014","unstructured":"N. Parikh, S. Boyd, Proximal algorithms. Found. Trends Optim. 1(3), 127\u2013239 (2014)","journal-title":"Found. Trends Optim."},{"key":"2226_CR43","doi-asserted-by":"publisher","first-page":"105532","DOI":"10.1016\/j.cmpb.2020.105532","volume":"194","author":"RM Pereira","year":"2020","unstructured":"R.M. Pereira, D. Bertolini, L.O. Teixeira, C.N. Silla Jr., Y.M. Costa, Covid-19 identification in chest x-ray images on flat and hierarchical classification scenarios. Comput. Methods Programs Biomed. 194, 105532 (2020)","journal-title":"Comput. Methods Programs Biomed."},{"key":"2226_CR44","doi-asserted-by":"publisher","first-page":"100199","DOI":"10.1016\/j.cosrev.2019.100199","volume":"34","author":"N Pitropakis","year":"2019","unstructured":"N. Pitropakis, E. Panaousis, T. Giannetsos, E. Anastasiadis, G. Loukas, A taxonomy and survey of attacks against machine learning. Comput. Sci. Rev. 34, 100199 (2019)","journal-title":"Comput. Sci. Rev."},{"issue":"11","key":"2226_CR45","doi-asserted-by":"publisher","first-page":"2772","DOI":"10.1109\/TIFS.2018.2834147","volume":"13","author":"W Quan","year":"2018","unstructured":"W. Quan, K. Wang, D. Yan, X. Zhang, Distinguishing between natural and computer-generated images using convolutional neural networks. IEEE Trans. Inf. Forensics Secur. 13(11), 2772\u20132787 (2018). https:\/\/doi.org\/10.1109\/TIFS.2018.2834147","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"2226_CR46","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.eng.2019.12.012","volume":"6","author":"K Ren","year":"2020","unstructured":"K. Ren, T. Zheng, Z. Qin, X. Liu, Adversarial attacks and defenses in deep learning. Engineering 6(3), 346\u2013360 (2020)","journal-title":"Engineering"},{"key":"2226_CR47","doi-asserted-by":"crossref","unstructured":"J. Rony, L.G. Hafemann, L.S. Oliveira, I.B. Ayed, R. Sabourin, E. Granger, Decoupling direction and norm for efficient gradient-based l2 adversarial attacks and defenses. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp 4322\u20134330 (2019)","DOI":"10.1109\/CVPR.2019.00445"},{"key":"2226_CR48","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.neucom.2014.11.086","volume":"176","author":"JA S\u00e1ez","year":"2016","unstructured":"J.A. S\u00e1ez, J. Luengo, F. Herrera, Evaluating the classifier behavior with noisy data considering performance and robustness: the equalized loss of accuracy measure. Neurocomputing 176, 26\u201335 (2016)","journal-title":"Neurocomputing"},{"issue":"1\u20132","key":"2226_CR49","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10618-010-0175-9","volume":"22","author":"CN Silla","year":"2011","unstructured":"C.N. Silla, A.A. Freitas, A survey of hierarchical classification across different application domains. Data Min. Knowl. Disc. 22(1\u20132), 31\u201372 (2011)","journal-title":"Data Min. Knowl. Disc."},{"key":"2226_CR50","doi-asserted-by":"crossref","unstructured":"C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, A. Rabinovich, Going deeper with convolutions. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1\u20139 (2015)","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"2226_CR51","unstructured":"C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, R. Fergus, Intriguing properties of neural networks. preprint arXiv:1312.6199 (2013)"},{"key":"2226_CR52","doi-asserted-by":"publisher","first-page":"3243","DOI":"10.1007\/s10462-021-10087-z","volume":"55","author":"E Tieppo","year":"2021","unstructured":"E. Tieppo, R.R.D. Santos, J.P. Barddal, J.C. Nievola, Hierarchical classification of data streams: a systematic literature review. Artif. Intell. Rev. 55, 3243 (2021)","journal-title":"Artif. Intell. Rev."},{"key":"2226_CR53","doi-asserted-by":"publisher","first-page":"123360","DOI":"10.1016\/j.talanta.2022.123360","volume":"243","author":"R Vitale","year":"2022","unstructured":"R. Vitale, G. Spinaci, F. Marini, P. Marion, M. Delcroix, A. Vieillard, F. Coudon, O. Devos, C. Ruckebusch, Hierarchical classification and matching of mid-infrared spectra of paint samples for forensic applications. Talanta 243, 123360 (2022)","journal-title":"Talanta"},{"issue":"4","key":"2226_CR54","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Z. Wang, A.C. Bovik, H.R. Sheikh, E.P. Simoncelli, Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"2226_CR55","doi-asserted-by":"crossref","unstructured":"Z. Wei, B. Zhang, H. Bi, Y. Lin, Y. Wu, Group sparsity based airborne wide angle SAR imaging. In image and signal processing for remote sensing XXII, volume 10004, page 100041V. International Society for Optics and Photonics (2016)","DOI":"10.1117\/12.2241389"},{"key":"2226_CR56","unstructured":"C. Xiao, J.-Y. Zhu, B. Li, W. He, M. Liu, D. Song, Spatially transformed adversarial examples. arXiv preprint arXiv:1801.02612 (2018)"},{"key":"2226_CR57","doi-asserted-by":"crossref","unstructured":"Z. Xiao, E. Dellandrea, W. Dou, L. Chen, Hierarchical classification of emotional speech. IEEE Trans. Multimedia, 37 (2007)","DOI":"10.1109\/ISMW.2007.4475985"},{"key":"2226_CR58","doi-asserted-by":"crossref","unstructured":"Z. Yao, A. Gholami, P. Xu, K. Keutzer, M. Mahoney, Trust region based adversarial attack on neural networks. preprint arXiv:1812.06371 (2018)","DOI":"10.1109\/CVPR.2019.01161"},{"key":"2226_CR59","doi-asserted-by":"crossref","unstructured":"P. Yu, K. Song, J. Lu, Generating adversarial examples with conditional generative adversarial net. In 2018 24th International conference on pattern recognition (ICPR), pp 676\u2013681. IEEE (2018)","DOI":"10.1109\/ICPR.2018.8545152"},{"issue":"9","key":"2226_CR60","doi-asserted-by":"publisher","first-page":"2805","DOI":"10.1109\/TNNLS.2018.2886017","volume":"30","author":"X Yuan","year":"2019","unstructured":"X. Yuan, P. He, Q. Zhu, X. Li, Adversarial examples: attacks and defenses for deep learning. IEEE Trans. Neural Netw. Learn. Syst. 30(9), 2805\u20132824 (2019)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"2226_CR61","doi-asserted-by":"crossref","unstructured":"P. Zhdanov, A. Khan, A.R. Rivera, A.M. Khattak, Improving human action recognition through hierarchical neural network classifiers. In 2018 international joint conference on neural networks (IJCNN), pp 1\u20137. IEEE (2018)","DOI":"10.1109\/IJCNN.2018.8489663"},{"key":"2226_CR62","doi-asserted-by":"publisher","first-page":"1452","DOI":"10.1109\/TIFS.2020.3036801","volume":"16","author":"Y Zhong","year":"2021","unstructured":"Y. Zhong, W. Deng, Towards transferable adversarial attack against deep face recognition. IEEE Trans. Inf. Forensics Secur. 16, 1452\u20131466 (2021). https:\/\/doi.org\/10.1109\/TIFS.2020.3036801","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"2226_CR63","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JPHOT.2015.2495104","volume":"7","author":"Y-J Zhu","year":"2015","unstructured":"Y.-J. Zhu, Z.-G. Sun, J.-K. Zhang, Y.-Y. Zhang, A fast blind detection algorithm for outdoor visible light communications. IEEE Photon. J. 7(6), 1\u20138 (2015)","journal-title":"IEEE Photon. J."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-022-02226-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-022-02226-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-022-02226-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T14:07:13Z","timestamp":1744207633000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-022-02226-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,6]]},"references-count":63,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["2226"],"URL":"https:\/\/doi.org\/10.1007\/s00034-022-02226-w","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"type":"print","value":"0278-081X"},{"type":"electronic","value":"1531-5878"}],"subject":[],"published":{"date-parts":[[2022,11,6]]},"assertion":[{"value":"22 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 October 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}