{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T03:56:58Z","timestamp":1777867018258,"version":"3.51.4"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T00:00:00Z","timestamp":1678752000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T00:00:00Z","timestamp":1678752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National Key Research and Development Program of China","award":["No.2020YFB1712401"],"award-info":[{"award-number":["No.2020YFB1712401"]}]},{"name":"National Key Research and Development Program of China","award":["NO.2018******4402"],"award-info":[{"award-number":["NO.2018******4402"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s00521-023-08266-w","type":"journal-article","created":{"date-parts":[[2023,3,26]],"date-time":"2023-03-26T23:09:11Z","timestamp":1679872151000},"page":"10821-10836","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An efficient method to fool and enhance object tracking with adversarial perturbations"],"prefix":"10.1007","volume":"35","author":[{"given":"Haibo","family":"Pang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rongqi","family":"Ma","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8650-4271","authenticated-orcid":false,"given":"Chengming","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jie","family":"Su","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Linxuan","family":"Han","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,3,14]]},"reference":[{"key":"8266_CR1","doi-asserted-by":"crossref","unstructured":"Bertinetto L, Valmadre J, Henriques JF, Vedaldi A, Torr P (2016) Fully-convolutional siamese networks for object tracking. In: European conference on computer vision workshops","DOI":"10.1007\/978-3-319-48881-3_56"},{"key":"8266_CR2","unstructured":"Bo L, Yan J, Wei W, Zheng Z, Hu X (2018) High performance visual tracking with Siamese region proposal network. In: IEEE conference on computer vision and pattern recognition"},{"key":"8266_CR3","doi-asserted-by":"crossref","unstructured":"Li B, Wu W, Wang Q, Zhang F, Xing J, Yan J (2020) Siamrpn++: evolution of siamese visual tracking with very deep networks. In: IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2019.00441"},{"key":"8266_CR4","doi-asserted-by":"crossref","unstructured":"Wang Q, Zhang L, Bertinetto L, Hu W, Torr P (2020) Fast online object tracking and segmentation: a unifying approach. In: IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2019.00142"},{"key":"8266_CR5","doi-asserted-by":"crossref","unstructured":"Guo D, Wang J, Cui Y, Wang Z, Chen S (2020) Siamcar: Siamese fully convolutional classification and regression for visual tracking. In: IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR42600.2020.00630"},{"key":"8266_CR6","doi-asserted-by":"crossref","unstructured":"Chen Z, Zhong B, Li G, Zhang S, Ji R (2020) Siamese box adaptive network for visual tracking. In: IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR42600.2020.00670"},{"key":"8266_CR7","doi-asserted-by":"publisher","first-page":"1956","DOI":"10.1109\/TMM.2021.3074239","volume":"24","author":"K Yang","year":"2022","unstructured":"Yang K, He Z, Pei W, Zhou Z, Li X, Yuan D, Zhang H (2022) Siamcorners: siamese corner networks for visual tracking. IEEE Trans Multimed 24:1956\u20131967. https:\/\/doi.org\/10.1109\/TMM.2021.3074239","journal-title":"IEEE Trans Multimed"},{"key":"8266_CR8","doi-asserted-by":"publisher","first-page":"9967","DOI":"10.1007\/s00521-022-06984-1","volume":"34","author":"Y Luo","year":"2022","unstructured":"Luo Y, Shen H, Cao X, Wang T, Feng Q, Tan Z (2022) Conversion of siamese networks to spiking neural networks for energy-efficient object tracking. Neural Comput Appl 34:9967\u20139982. https:\/\/doi.org\/10.1007\/s00521-022-06984-1","journal-title":"Neural Comput Appl"},{"key":"8266_CR9","doi-asserted-by":"crossref","unstructured":"Han W, Dong X, Khan FS, Shao L, Shen J (2020) Learning to fuse asymmetric feature maps in siamese trackers. In: IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR46437.2021.01630"},{"key":"8266_CR10","doi-asserted-by":"crossref","unstructured":"Guo D, Shao Y, Cui Y, Wang Z, Zhang L, Shen C (2021) Graph attention tracking. In: IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR46437.2021.00942"},{"key":"8266_CR11","doi-asserted-by":"crossref","unstructured":"Bhat G, Danelljan M, Gool LV, Timofte R (2019) Learning discriminative model prediction for tracking. In: IEEE international conference on computer vision","DOI":"10.1109\/ICCV.2019.00628"},{"key":"8266_CR12","doi-asserted-by":"crossref","unstructured":"Danelljan M, Bhat G, Khan FS, Felsberg M (2020) Atom: Accurate tracking by overlap maximization. In: IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2019.00479"},{"key":"8266_CR13","doi-asserted-by":"crossref","unstructured":"Yu B, Tang M, Zheng L, Zhu G, Wang J, Feng H, Feng X, Lu H (2021) High-performance discriminative tracking with transformers. In: Proceedings of the IEEE\/CVF international conference on computer vision (ICCV), pp 9856\u20139865","DOI":"10.1109\/ICCV48922.2021.00971"},{"key":"8266_CR14","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. In: International conference on learning representations"},{"key":"8266_CR15","doi-asserted-by":"crossref","unstructured":"Wang J, Liu A, Yin Z, Liu S, Liu X (2021) Dual attention suppression attack: generate adversarial camouflage in physical world. In: IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR46437.2021.00846"},{"key":"8266_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06330-x","author":"A Kherchouche","year":"2021","unstructured":"Kherchouche A, Fezza SA (2021) Detect and defense against adversarial examples in deep learning using natural scene statistics and adaptive denoising. Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-021-06330-x","journal-title":"Neural Comput Appl"},{"key":"8266_CR17","doi-asserted-by":"publisher","first-page":"7113","DOI":"10.1007\/s00521-021-06846-2","volume":"34","author":"S Park","year":"2022","unstructured":"Park S, Yeo Y-J, Shin Y-G (2022) Pconv: simple yet effective convolutional layer for generative adversarial network. Neural Comput Appl 34:7113\u20137124. https:\/\/doi.org\/10.1007\/s00521-021-06846-2","journal-title":"Neural Comput Appl"},{"key":"8266_CR18","doi-asserted-by":"crossref","unstructured":"Thys S, Ranst WV, Goedeme T (2019) Fooling automated surveillance cameras: adversarial patches to attack person detection. In: IEEE conference on computer vision and pattern recognition workshops","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"8266_CR19","doi-asserted-by":"crossref","unstructured":"Wang J, Liu A, Yin Z, Liu S, Liu X (2021) Dual attention suppression attack: generate adversarial camouflage in physical world. In: IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR46437.2021.00846"},{"key":"8266_CR20","doi-asserted-by":"crossref","unstructured":"Yan B, Wang D, Lu H, Yang X (2020) Cooling-shrinking attack: Blinding the tracker with imperceptible noises. In: IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR42600.2020.00107"},{"key":"8266_CR21","doi-asserted-by":"crossref","unstructured":"Jia S, Song Y, Ma C, Yang X (2021) Iou attack: Towards temporally coherent black-box adversarial attack for visual object tracking. In: IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR46437.2021.00664"},{"key":"8266_CR22","doi-asserted-by":"crossref","unstructured":"Guo Q, Cheng Z, Juefei-Xu F, Ma L, Zhao J (2021) Learning to adversarially blur visual object tracking. In: International conference on computer vision","DOI":"10.1109\/ICCV48922.2021.01066"},{"key":"8266_CR23","doi-asserted-by":"crossref","unstructured":"Xie C, Tan M, Gong B, Wang J, Yuille AL, Le QV (2019) Adversarial examples improve image recognition. In: IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR42600.2020.00090"},{"key":"8266_CR24","doi-asserted-by":"crossref","unstructured":"Liang S, Wei X, Yao S, Cao X (2020) Efficient adversarial attacks for visual object tracking. In: IEEE conference on computer vision and pattern recognition","DOI":"10.1007\/978-3-030-58574-7_3"},{"key":"8266_CR25","doi-asserted-by":"crossref","unstructured":"Jia S, Ma C, Song Y, Yang X (2020) Robust tracking against adversarial attacks. In: European conference on computer vision","DOI":"10.1007\/978-3-030-58529-7_5"},{"issue":"9","key":"8266_CR26","doi-asserted-by":"publisher","first-page":"1834","DOI":"10.1109\/TPAMI.2014.2388226","volume":"37","author":"Y Wu","year":"2015","unstructured":"Wu Y, Lim J, Yang MH (2015) Object tracking benchmark. IEEE Trans Pattern Anal Mach Intell 37(9):1834\u20131848. https:\/\/doi.org\/10.1109\/TPAMI.2014.2388226","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"8266_CR27","unstructured":"Kristan M, Leonardis A, Matas J, Felsberg M, He Z (2019) The sixth visual object tracking vot2018 challenge results. In: European conference on computer vision workshops"},{"key":"8266_CR28","unstructured":"Kristan M, Leonardis A, Matas J, Felsberg M, Pflugfelder R (2020) The eighth visual object tracking vot2020 challenge results. In: European conference on computer vision workshops"},{"key":"8266_CR29","doi-asserted-by":"crossref","unstructured":"Muller M, Bibi A, Giancola S, Alsubaihi S, Ghanem B (2018) Trackingnet: a large-scale dataset and benchmark for object tracking in the wild. In: The European conference on computer vision (ECCV)","DOI":"10.1007\/978-3-030-01246-5_19"},{"key":"8266_CR30","doi-asserted-by":"crossref","unstructured":"Mueller M, Smith N, Ghanem B (2016) A benchmark and simulator for uav tracking. In: European conference on computer vision","DOI":"10.1007\/978-3-319-46448-0_27"},{"key":"8266_CR31","doi-asserted-by":"crossref","unstructured":"Fan H, Ling H, Lin L, Yang F, Liao C (2019) Lasot: a high-quality benchmark for large-scale single object tracking. In: IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2019.00552"},{"key":"8266_CR32","doi-asserted-by":"crossref","unstructured":"Wang N, Zhou W, Wang J, Li H (2021) Transformer meets tracker: Exploiting temporal context for robust visual tracking. In: IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR46437.2021.00162"},{"key":"8266_CR33","unstructured":"Ren S, He K, Girshick R, Sun J (2015) Faster r-cnn: Towards real-time object detection with region proposal networks. In: International conference on neural information processing systems, pp 91\u201399"},{"key":"8266_CR34","doi-asserted-by":"crossref","unstructured":"Zhu Z, Wang Q, Li B, Wu W, Yan J, Hu W (2018) Distractor-aware siamese networks for visual object tracking. In: European conference on computer vision","DOI":"10.1007\/978-3-030-01240-3_7"},{"key":"8266_CR35","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2016.90"},{"key":"8266_CR36","unstructured":"Howard AG, Zhu M, Chen B, Kalenichenko D, Wang W, Weyand T, Andreetto M, Adam H (2017) Mobilenets Efficient convolutional neural networks for mobile vision applications. In: IEEE conference on computer vision and pattern recognition"},{"key":"8266_CR37","doi-asserted-by":"publisher","first-page":"976","DOI":"10.1109\/TIP.2020.3037518","volume":"30","author":"D Yuan","year":"2021","unstructured":"Yuan D, Chang X, Huang P-Y, Liu Q, He Z (2021) Self-supervised deep correlation tracking. IEEE Trans Image Process 30:976\u2013985. https:\/\/doi.org\/10.1109\/TIP.2020.3037518","journal-title":"IEEE Trans Image Process"},{"key":"8266_CR38","doi-asserted-by":"crossref","unstructured":"Thys S, Ranst WV, Goedeme T (2019) Fooling automated surveillance cameras: adversarial patches to attack person detection. In: IEEE conference on computer vision and pattern recognition workshops","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"8266_CR39","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. In: International conference on learning representations"},{"key":"8266_CR40","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli SM, Fawzi A, Frossard P (2016) Deepfool: a simple and accurate method to fool deep neural networks. In: IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2016.282"},{"key":"8266_CR41","doi-asserted-by":"crossref","unstructured":"Xiao C, Li B, Zhu J, He W, Liu M, Song D (2018) Generating adversarial examples with adversarial networks. In: International joint conference on artificial intelligence","DOI":"10.24963\/ijcai.2018\/543"},{"key":"8266_CR42","doi-asserted-by":"crossref","unstructured":"Chen X, Yan X, Zheng F, Jiang Y, Ji R (2020) One-shot adversarial attacks on visual tracking with dual attention. In: IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR42600.2020.01019"},{"key":"8266_CR43","doi-asserted-by":"crossref","unstructured":"Guo Q, Xie X, Juefei-Xu F, Ma L, Li Z, Xue W, Feng W, Liu Y (2020) Spark: Spatial-aware online incremental attack against visual tracking. In: European conference on computer vision","DOI":"10.1007\/978-3-030-58595-2_13"},{"key":"8266_CR44","doi-asserted-by":"crossref","unstructured":"Ronneberger O, Fischer P, Brox T (2015) U-net: Convolutional networks for biomedical image segmentation. In: International conference on medical image computing and computer-assisted intervention","DOI":"10.1007\/978-3-319-24574-4_28"},{"issue":"5","key":"8266_CR45","doi-asserted-by":"publisher","first-page":"1562","DOI":"10.1109\/TPAMI.2019.2957464","volume":"43","author":"L Huang","year":"2021","unstructured":"Huang L, Zhao X, Huang K (2021) Got-10k: a large high-diversity benchmark for generic object tracking in the wild. IEEE Trans Pattern Anal Mach Intell 43(5):1562\u20131577. https:\/\/doi.org\/10.1109\/TPAMI.2019.2957464","journal-title":"IEEE Trans Pattern Anal Mach Intell"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08266-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-023-08266-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08266-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T17:38:29Z","timestamp":1682357909000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-023-08266-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,14]]},"references-count":45,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["8266"],"URL":"https:\/\/doi.org\/10.1007\/s00521-023-08266-w","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,14]]},"assertion":[{"value":"28 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}