{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:20:38Z","timestamp":1740108038597,"version":"3.37.3"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"22","license":[{"start":{"date-parts":[[2022,7,21]],"date-time":"2022-07-21T00:00:00Z","timestamp":1658361600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,21]],"date-time":"2022-07-21T00:00:00Z","timestamp":1658361600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62071275"],"award-info":[{"award-number":["62071275"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shandong Province Key Innovation Project","award":["2020CXGC010903","2021SFGC0701"],"award-info":[{"award-number":["2020CXGC010903","2021SFGC0701"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s00521-022-07568-9","type":"journal-article","created":{"date-parts":[[2022,7,21]],"date-time":"2022-07-21T20:17:06Z","timestamp":1658434626000},"page":"20249-20262","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing adversarial transferability with partial blocks on vision transformer"],"prefix":"10.1007","volume":"34","author":[{"given":"Yanyang","family":"Han","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3160-9233","authenticated-orcid":false,"given":"Ju","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiaoxi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Lingchen","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Xuesong","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Weiqiang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,21]]},"reference":[{"key":"7568_CR1","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser \u0141, Polosukhin I (2017) Attention is all you need. In: Proceedings of the advances in neural information processing systems, pp. 5998\u20136008"},{"key":"7568_CR2","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TASLP.2020.3042001","volume":"29","author":"Y Kawara","year":"2020","unstructured":"Kawara Y, Chu C, Arase Y (2020) Preordering encoding on transformer for translation. IEEE\/ACM Trans Audio, Speech, and Language Process 29:644\u2013655","journal-title":"IEEE\/ACM Trans Audio, Speech, and Language Process"},{"key":"7568_CR3","doi-asserted-by":"crossref","unstructured":"Carion N, Massa F, Synnaeve G, Usunier N, Kirillov A, Zagoruyko S (2020) End-to-end object detection with transformers. In: European conference on computer vision, pp. 213\u2013229","DOI":"10.1007\/978-3-030-58452-8_13"},{"issue":"1","key":"7568_CR4","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/TGRS.2019.2934760","volume":"58","author":"J He","year":"2019","unstructured":"He J, Zhao L, Yang H, Zhang M, Li W (2019) Hsi-bert: Hyperspectral image classification using the bidirectional encoder representation from transformers. IEEE Trans Geosci Remote Sens 58(1):165\u2013178","journal-title":"IEEE Trans Geosci Remote Sens"},{"key":"7568_CR5","unstructured":"Dosovitskiy A, Beyer L, Kolesnikov A, Weissenborn D, Zhai X, Unterthiner T, Dehghani M, Minderer M, Heigold G, Gelly S, et al (2020) An image is worth 16x16 words: Transformers for image recognition at scale. In: 8th International conference on learning representations"},{"key":"7568_CR6","unstructured":"Paul S, Chen PY (2021) Vision transformers are robust learners. http:\/\/arxiv.org\/abs\/2105.07581"},{"key":"7568_CR7","unstructured":"Naseer M, Ranasinghe K, Khan S, Hayat M, Khan FS, Yang MH (2021) Intriguing properties of vision transformers. http:\/\/arxiv.org\/abs\/2105.10497"},{"key":"7568_CR8","unstructured":"Shao R, Shi Z, Yi J, Chen PY, Hsieh CJ (2021) On the adversarial robustness of visual transformers. http:\/\/arxiv.org\/abs\/2103.15670"},{"key":"7568_CR9","unstructured":"Naseer M, Ranasinghe K, Khan S, Khan FS, Porikli F (2021) On improving adversarial transferability of vision transformers. http:\/\/arxiv.org\/abs\/2106.04169"},{"issue":"14","key":"7568_CR10","doi-asserted-by":"publisher","first-page":"8191","DOI":"10.1007\/s00521-020-04933-4","volume":"33","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Wang S, Zhao H, Guo Z, Sun D (2020) Ct image classification based on convolutional neural network. Neural Comput Appl 33(14):8191\u20138200","journal-title":"Neural Comput Appl"},{"issue":"6","key":"7568_CR11","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/s11263-019-01160-w","volume":"127","author":"G Goswami","year":"2019","unstructured":"Goswami G, Agarwal A, Ratha N, Singh R, Vatsa M (2019) Detecting and mitigating adversarial perturbations for robust face recognition. Int J Computer Vision 127(6):719\u2013742","journal-title":"Int J Computer Vision"},{"issue":"9","key":"7568_CR12","doi-asserted-by":"publisher","first-page":"2805","DOI":"10.1109\/TNNLS.2018.2886017","volume":"30","author":"X Yuan","year":"2019","unstructured":"Yuan X, He P, Zhu Q, Li X (2019) Adversarial examples: attacks and defenses for deep learning. IEEE Trans Neural Netw Learn Syst 30(9):2805\u20132824","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"7568_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06159-4","author":"J Zhuang","year":"2021","unstructured":"Zhuang J, Sun J, Yuan G (2021) Arrhythmia diagnosis of young martial arts athletes based on deep learning for smart medical care. Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-021-06159-4","journal-title":"Neural Comput Appl"},{"issue":"12","key":"7568_CR14","doi-asserted-by":"publisher","first-page":"7897","DOI":"10.1109\/TII.2021.3071405","volume":"17","author":"Y Deng","year":"2021","unstructured":"Deng Y, Zhang T, Lou G, Zheng X, Jin J, Han QL (2021) Deep learning-based autonomous driving systems: a survey of attacks and defenses. IEEE Trans Indus Inf 17(12):7897\u20137912","journal-title":"IEEE Trans Indus Inf"},{"key":"7568_CR15","doi-asserted-by":"publisher","first-page":"12571","DOI":"10.1007\/s00521-021-05907-w","volume":"33","author":"Z Zhou","year":"2021","unstructured":"Zhou Z, Yu H, Fan G (2021) Adversarial training and ensemble learning for automatic code summarization. Neural Comput Appl 33:12571\u201312589. https:\/\/doi.org\/10.1007\/s00521-021-05907-w","journal-title":"Neural Comput Appl"},{"issue":"12","key":"7568_CR16","doi-asserted-by":"publisher","first-page":"3040","DOI":"10.1109\/TPAMI.2019.2919707","volume":"42","author":"A Arnab","year":"2019","unstructured":"Arnab A, Miksik O, Torr PH (2019) On the robustness of semantic segmentation models to adversarial attacks. IEEE Trans Pattern Anal Mach Intell 42(12):3040\u20133053","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"7568_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06330-x","author":"A Kherchouche","year":"2021","unstructured":"Kherchouche A, Fezza SA, Hamidouche W (2021) Detect and defense against adversarial examples in deep learning using natural scene statistics and adaptive denoising. Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-021-06330-x","journal-title":"Neural Comput Appl"},{"key":"7568_CR18","doi-asserted-by":"crossref","unstructured":"Dong Y, Fu QA, Yang X, Pang T, Su H, Xiao Z, Zhu J (2020) Benchmarking adversarial robustness on image classification. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 321\u2013331","DOI":"10.1109\/CVPR42600.2020.00040"},{"key":"7568_CR19","unstructured":"Boopathy A, Liu S, Zhang G, Liu C, Chen PY, Chang S, Daniel L (2020) Proper network interpretability helps adversarial robustness in classification. In: Proceedings of the international conference on machine learning, pp. 1014\u20131023"},{"issue":"7","key":"7568_CR20","first-page":"2578","volume":"31","author":"J Zhang","year":"2019","unstructured":"Zhang J, Li C (2019) Adversarial examples: opportunities and challenges. IEEE Trans Neural Netw Learn Syst 31(7):2578\u20132593","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"7568_CR21","doi-asserted-by":"crossref","unstructured":"Andriushchenko M, Croce F, Flammarion N, Hein M (2020) Square attack: a query-efficient black-box adversarial attack via random search. In: European conference on computer vision, pp. 484\u2013501","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"7568_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3126733","author":"Y Dong","year":"2021","unstructured":"Dong Y, Cheng S, Pang T, Su H, Zhu J (2021) Query-efficient black-box adversarial attacks guided by a transfer-based prior. IEEE Trans Pattern Anal Mach Intell. https:\/\/doi.org\/10.1109\/TPAMI.2021.3126733","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"8","key":"7568_CR23","doi-asserted-by":"publisher","first-page":"6337","DOI":"10.1109\/JIOT.2020.3016145","volume":"8","author":"Y Li","year":"2020","unstructured":"Li Y, Xu X, Xiao J, Li S, Shen HT (2020) Adaptive square attack: fooling autonomous cars with adversarial traffic signs. IEEE Internet of Things J 8(8):6337\u20136347","journal-title":"IEEE Internet of Things J"},{"key":"7568_CR24","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.patcog.2021.108306","volume":"122","author":"AE Cin\u00e0","year":"2022","unstructured":"Cin\u00e0 AE, Torcinovich A, Pelillo M (2022) A black-box adversarial attack for poisoning clustering. Pattern Recognit 122:8. https:\/\/doi.org\/10.1016\/j.patcog.2021.108306","journal-title":"Pattern Recognit"},{"key":"7568_CR25","doi-asserted-by":"crossref","unstructured":"Xie C, Zhang Z, Zhou Y, Bai S, Wang J, Ren Z, Yuille AL (2019) Improving transferability of adversarial examples with input diversity. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2730\u20132739","DOI":"10.1109\/CVPR.2019.00284"},{"key":"7568_CR26","unstructured":"Wu D, Wang Y, Xia ST, Bailey J, Ma X (2019) Skip connections matter: On the transferability of adversarial examples generated with resnets. In: 7th International conference on learning representations"},{"key":"7568_CR27","doi-asserted-by":"crossref","unstructured":"Yuan L, Chen Y, Wang T, Yu W, Shi Y, Jiang Z, Tay FE, Feng J, Yan S (2021) Tokens-to-token vit: Training vision transformers from scratch on imagenet. http:\/\/arxiv.org\/abs\/2101.11986","DOI":"10.1109\/ICCV48922.2021.00060"},{"key":"7568_CR28","unstructured":"Han K, Xiao A, Wu E, Guo J, Xu C, Wang Y (2021) Transformer in transformer. http:\/\/arxiv.org\/abs\/2103.00112"},{"key":"7568_CR29","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. http:\/\/arxiv.org\/abs\/1409.1556"},{"key":"7568_CR30","doi-asserted-by":"crossref","unstructured":"Huang G, Liu Z, Van Der\u00a0Maaten L, Weinberger KQ (2017) Densely connected convolutional networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 4700\u20134708","DOI":"10.1109\/CVPR.2017.243"},{"key":"7568_CR31","doi-asserted-by":"crossref","unstructured":"Hu J, Shen L, Sun G (2018) Squeeze-and-excitation networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 7132\u20137141","DOI":"10.1109\/CVPR.2018.00745"},{"key":"7568_CR32","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"7568_CR33","unstructured":"Ba JL, Kiros JR, Hinton GE (2016) Layer normalization. http:\/\/arxiv.org\/abs\/1607.06450"},{"key":"7568_CR34","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. http:\/\/arxiv.org\/abs\/1412.6572"},{"key":"7568_CR35","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2018) Towards deep learning models resistant to adversarial attacks. In: 6th International conference on learning representations"},{"key":"7568_CR36","unstructured":"Touvron H, Cord M, Douze M, Massa F, Sablayrolles A, J\u00e9gou H (2021) Training data-efficient image transformers & distillation through attention. In: Proceedings of the international conference on machine learning, pp. 10,347\u201310,357"},{"issue":"3","key":"7568_CR37","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky O, Deng J, Su H, Krause J, Satheesh S, Ma S, Huang Z, Karpathy A, Khosla A, Bernstein M et al (2015) Imagenet large scale visual recognition challenge. Int J Computer Vision 115(3):211\u2013252","journal-title":"Int J Computer Vision"},{"key":"7568_CR38","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. http:\/\/arxiv.org\/abs\/1312.6199"},{"key":"7568_CR39","doi-asserted-by":"crossref","unstructured":"Wu W, Su Y, Chen X, Zhao S, King I, Lyu MR, Tai YW (2020) Boosting the transferability of adversarial samples via attention. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1161\u20131170","DOI":"10.1109\/CVPR42600.2020.00124"},{"key":"7568_CR40","doi-asserted-by":"crossref","unstructured":"Dong Y, Liao F, Pang T, Su H, Zhu J, Hu X, Li J (2018) Boosting adversarial attacks with momentum. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 9185\u20139193","DOI":"10.1109\/CVPR.2018.00957"},{"key":"7568_CR41","doi-asserted-by":"crossref","unstructured":"Wang Z, Guo H, Zhang Z, Liu W, Qin Z, Ren K (2021) Feature importance-aware transferable adversarial attacks. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp. 7639\u20137648","DOI":"10.1109\/ICCV48922.2021.00754"},{"key":"7568_CR42","doi-asserted-by":"crossref","unstructured":"Wang J, Liu A, Yin Z, Liu S, Tang S, Liu X (2021) Dual attention suppression attack: Generate adversarial camouflage in physical world. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 8565\u20138574","DOI":"10.1109\/CVPR46437.2021.00846"},{"issue":"2","key":"7568_CR43","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/TAI.2020.3046167","volume":"1","author":"J Kantipudi","year":"2020","unstructured":"Kantipudi J, Dubey SR, Chakraborty S (2020) Color channel perturbation attacks for fooling convolutional neural networks and a defense against such attacks. IEEE Trans Artif Intell 1(2):181\u2013191","journal-title":"IEEE Trans Artif Intell"},{"key":"7568_CR44","doi-asserted-by":"crossref","unstructured":"De K, Pedersen M (2021) Impact of colour on robustness of deep neural networks. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp. 21\u201330","DOI":"10.1109\/ICCVW54120.2021.00009"},{"key":"7568_CR45","unstructured":"Wei Z, Chen J, Goldblum M, Wu Z, Goldstein T, Jiang YG (2021) Towards transferable adversarial attacks on vision transformers. http:\/\/arxiv.org\/abs\/2109.04176"},{"key":"7568_CR46","doi-asserted-by":"crossref","unstructured":"Chen X, He K (2021) Exploring simple siamese representation learning. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 15,750\u201315,758","DOI":"10.1109\/CVPR46437.2021.01549"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-022-07568-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-022-07568-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-022-07568-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T20:59:43Z","timestamp":1666299583000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-022-07568-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,21]]},"references-count":46,"journal-issue":{"issue":"22","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["7568"],"URL":"https:\/\/doi.org\/10.1007\/s00521-022-07568-9","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2022,7,21]]},"assertion":[{"value":"27 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The code of PBSA utilized during this study are available at .","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}