{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T02:57:11Z","timestamp":1773457031245,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s00521-026-11869-8","type":"journal-article","created":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T02:05:52Z","timestamp":1773453952000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["AEGM-C&amp;V: enhanced adversarial example generation method combining complexity perception model and variance map"],"prefix":"10.1007","volume":"38","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-8872-3304","authenticated-orcid":false,"given":"Ryungeon","family":"Lee","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1274-6291","authenticated-orcid":false,"given":"Youngho","family":"Cho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,14]]},"reference":[{"key":"11869_CR1","doi-asserted-by":"crossref","unstructured":"Girshick, R., Donahue, J., Darrell, T., & Malik, J. (2014) Rich feature hierarchies for accurate object detection and semantic segmentation. In: Proceedings of the IEEE conference on computer vision and pattern recognition pp. 580\u2013587","DOI":"10.1109\/CVPR.2014.81"},{"key":"11869_CR2","unstructured":"Krizhevsky, A., Sutskever, I., & Hinton, G. E. (2012) Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems, 25"},{"issue":"6","key":"11869_CR3","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2012.2205597","volume":"29","author":"G Hinton","year":"2012","unstructured":"Hinton G, Deng L, Yu D, Dahl GE, Mohamed AR, Jaitly N, Kingsbury B (2012) Deep neural networks for acoustic modeling in speech recognition: the shared views of four research groups. IEEE Signal Process Mag 29(6):82\u201397","journal-title":"IEEE Signal Process Mag"},{"key":"11869_CR4","doi-asserted-by":"crossref","unstructured":"Andor, D., Alberti, C., Weiss, D., Severyn, A., Presta, A., Ganchev, K., & Collins, M. (2016) Globally normalized transition-based neural networks. arXiv preprint arXiv:1603.06042","DOI":"10.18653\/v1\/P16-1231"},{"key":"11869_CR5","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., & Fergus, R. (2013) Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199"},{"key":"11869_CR6","unstructured":"Goodfellow, I. J., Shlens, J., & Szegedy, C. (2014) Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572.J. Newman, Electrochemical Systems, 2nd ed., Prentice-Hall, Englewood Cliffs, NJ, 1991"},{"key":"11869_CR7","doi-asserted-by":"crossref","unstructured":"Nguyen, A., Yosinski, J., & Clune, J. (2015) Deep neural networks are easily fooled: High confidence predictions for unrecognizable images. In: Proceedings of the IEEE conference on computer vision and pattern recognition pp. 427\u2013436","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"11869_CR8","doi-asserted-by":"crossref","unstructured":"Xie, C., Wang, J., Zhang, Z., Zhou, Y., Xie, L., & Yuille, A. (2017) Adversarial examples for semantic segmentation and object detection. In: Proceedings of the IEEE international conference on computer vision pp. 1369\u20131378","DOI":"10.1109\/ICCV.2017.153"},{"key":"11869_CR9","doi-asserted-by":"crossref","unstructured":"Wei, H. N., Zeng, G. Q., Lu, K. D., Geng, G. G., & Weng, J. (2024) MoAR-CNN: Multi-objective adversarially robust convolutional neural network for SAR image classification. In: IEEE Transactions on Emerging Topics in Computational Intelligence","DOI":"10.1109\/TETCI.2024.3449908"},{"key":"11869_CR10","doi-asserted-by":"crossref","unstructured":"Liang, B., Li, H., Su, M., Bian, P., Li, X., & Shi, W. (2017) Deep text classification can be fooled. arXiv preprint arXiv:1704.08006","DOI":"10.24963\/ijcai.2018\/585"},{"key":"11869_CR11","unstructured":"Belinkov, Y., & Bisk, Y. (2017) Synthetic and natural noise both break neural machine translation. arXiv preprint arXiv:1711.02173"},{"issue":"2","key":"11869_CR12","doi-asserted-by":"publisher","DOI":"10.1049\/csy2.12117","volume":"6","author":"GQ Zeng","year":"2024","unstructured":"Zeng GQ, Shao JM, Lu KD, Geng GG, Weng J (2024) Automated federated learning\u2010based adversarial attack and defence in industrial control systems. IET Cyber-Syst Robot 6(2):e12117","journal-title":"IET Cyber-Syst Robot"},{"key":"11869_CR13","unstructured":"Kurakin, A., Goodfellow, I., & Bengio, S. (2016) Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236"},{"key":"11869_CR14","doi-asserted-by":"crossref","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., & Reiter, M. K. (2016) Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In: Proceedings of the 2016 acm sigsac conference on computer and communications security pp. 1528\u20131540","DOI":"10.1145\/2976749.2978392"},{"key":"11869_CR15","doi-asserted-by":"crossref","unstructured":"Eykholt, K., Evtimov, I., Fernandes, E., Li, B., Rahmati, A., Xiao, C., s& Song, D. (2018). Robust physical-world attacks on deep learning visual classification. In: Proceedings of the IEEE conference on computer vision and pattern recognition pp. 1625\u20131634","DOI":"10.1109\/CVPR.2018.00175"},{"key":"11869_CR16","unstructured":"Kurakin, A., Goodfellow, I., & Bengio, S. (2016) Adversarial examples in the physical world"},{"key":"11869_CR17","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., & Vladu, A. (2017) Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083"},{"key":"11869_CR18","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S. M., Fawzi, A., & Frossard, P. (2016) Deepfool: a simple and accurate method to fool deep neural networks. In Proceedings of the IEEE conference on computer vision and pattern recognition pp. 2574\u20132582","DOI":"10.1109\/CVPR.2016.282"},{"key":"11869_CR19","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z. B., & Swami, A. (2016) The limitations of deep learning in adversarial settings. In:\u00a02016 IEEE European symposium on security and privacy (EuroS&P)\u00a0(pp. 372\u2013387). IEEE","DOI":"10.1109\/EuroSP.2016.36"},{"key":"11869_CR20","doi-asserted-by":"crossref","unstructured":"Carlini, N., & Wagner, D. (2017) Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp) (pp. 39\u201357). IEEE","DOI":"10.1109\/SP.2017.49"},{"key":"11869_CR21","unstructured":"Jordan, M., Manoj, N., Goel, S., & Dimakis, A. G. (2019) Quantifying perceptual distortion of adversarial examples.\u00a0arXiv preprint arXiv:1902.08265"},{"key":"11869_CR22","unstructured":"Karli, B. T., Sen, D., & Temizel, A. (2021) Improving perceptual quality of adversarial images using perceptual distance minimization and normalized variance weighting. In:\u00a0The AAAI-22 Workshop on Adversarial Machine Learning and Beyond"},{"key":"11869_CR23","doi-asserted-by":"crossref","unstructured":"Croce, F., & Hein, M. (2019) Sparse and imperceivable adversarial attacks. In:\u00a0Proceedings of the IEEE\/CVF international conference on computer vision pp. 4724\u20134732","DOI":"10.1109\/ICCV.2019.00482"},{"key":"11869_CR24","doi-asserted-by":"crossref","unstructured":"Aydin, A., Sen, D., Karli, B. T., Hanoglu, O., & Temizel, A. (2021). Imperceptible adversarial examples by spatial chroma-shift. In:\u00a0Proceedings of the 1st International Workshop on Adversarial Learning for Multimedia pp. 8\u201314","DOI":"10.1145\/3475724.3483604"},{"issue":"3","key":"11869_CR25","first-page":"1474","volume":"18","author":"Z Wang","year":"2019","unstructured":"Wang Z, Song M, Zheng S, Zhang Z, Song Y, Wang Q (2019) Invisible adversarial attack against deep neural networks: an adaptive penalization approach. IEEE Trans Depend Secure Comput 18(3):1474\u20131488","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"8","key":"11869_CR26","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11081283","volume":"11","author":"H Liang","year":"2022","unstructured":"Liang H, He E, Zhao Y, Jia Z, Li H (2022) Adversarial attack and defense: a survey. Electronics 11(8):1283","journal-title":"Electronics"},{"issue":"10","key":"11869_CR27","doi-asserted-by":"publisher","first-page":"1485","DOI":"10.1109\/83.718488","volume":"7","author":"TS Chen","year":"1998","unstructured":"Chen TS, Chang CC, Hwang MS (1998) A virtual image cryptosystem based upon vector quantization. IEEE Trans Image Process 7(10):1485\u20131488","journal-title":"IEEE Trans Image Process"},{"issue":"6","key":"11869_CR28","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0157986","volume":"11","author":"SE Corchs","year":"2016","unstructured":"Corchs SE, Ciocca G, Bricolo E, Gasparini F (2016) Predicting complexity perception of real world images. PLoS ONE 11(6):e0157986","journal-title":"PLoS ONE"},{"key":"11869_CR29","doi-asserted-by":"crossref","unstructured":"Luo, B., Liu, Y., Wei, L., & Xu, Q. (2018) Towards imperceptible and robust adversarial example attacks against neural networks. In:\u00a0Proceedings of the AAAI conference on artificial intelligence\u00a032(1)","DOI":"10.1609\/aaai.v32i1.11499"},{"key":"11869_CR30","doi-asserted-by":"crossref","unstructured":"Chen, Z., Wang, Z., Huang, J. J., Zhao, W., Liu, X., & Guan, D. (2023) Imperceptible adversarial attack via invertible neural networks. In:\u00a0Proceedings of the AAAI Conference on Artificial Intelligence: Vol. 37(1), pp. 414\u2013424","DOI":"10.1609\/aaai.v37i1.25115"},{"key":"11869_CR31","doi-asserted-by":"crossref","unstructured":"Luo, C., Lin, Q., Xie, W., Wu, B., Xie, J., & Shen, L. (2022) Frequency-driven imperceptible adversarial attack on semantic similarity. In:\u00a0Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition,\u00a0pp. 15315\u201315324","DOI":"10.1109\/CVPR52688.2022.01488"},{"key":"11869_CR32","unstructured":"Aksoy, B., & Temizel, A. (2019) Attack type agnostic perceptual enhancement of adversarial images.\u00a0arXiv preprint arXiv:1903.03029"},{"key":"11869_CR33","first-page":"52323","volume":"37","author":"J Li","year":"2024","unstructured":"Li J, He Z, Luo A, Hu JF, Wang ZJ, Kang X (2024) AdvAD: exploring non-parametric diffusion for imperceptible adversarial attacks. Adv Neural Inf Process Syst 37:52323\u201352353","journal-title":"Adv Neural Inf Process Syst"},{"key":"11869_CR34","doi-asserted-by":"crossref","unstructured":"Pei, G., Ma, K., Zhang, D., Sun, C., Xu, Q., & Huang, Q. (2025) A unified framework for stealthy adversarial generation via latent optimization and transferability enhancement. arXiv preprint arXiv:2506.23676","DOI":"10.1145\/3746027.3761985"},{"key":"11869_CR35","unstructured":"Nicolae, M. I., Sinn, M., Tran, M. N., Buesser, B., Rawat, A., Wistuba, M., & Edwards, B. (2018) Adversarial robustness Toolbox v1. 0.0. arXiv preprint arXiv:1807.01069"},{"key":"11869_CR36","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., & Wojna, Z. (2016) Rethinking the inception architecture for computer vision. In:\u00a0Proceedings of the IEEE conference on computer vision and pattern recognition pp. 2818\u20132826","DOI":"10.1109\/CVPR.2016.308"},{"key":"11869_CR37","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L. J., Li, K., & Fei-Fei, L. (2009) Imagenet: A large-scale hierarchical image database. In: Proceedings of the IEEE conference on computer vision and pattern recognition pp. 248\u2013255","DOI":"10.1109\/CVPR.2009.5206848"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-026-11869-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-026-11869-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-026-11869-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T02:05:57Z","timestamp":1773453957000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-026-11869-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":37,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["11869"],"URL":"https:\/\/doi.org\/10.1007\/s00521-026-11869-8","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3]]},"assertion":[{"value":"17 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"159"}}