{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T15:25:11Z","timestamp":1773242711736,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T00:00:00Z","timestamp":1773100800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T00:00:00Z","timestamp":1773100800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s10044-026-01648-5","type":"journal-article","created":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T19:45:43Z","timestamp":1773171943000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cross-architecture robustness evaluation using SVD-guided attention-aware adversarial attacks on vision transformers"],"prefix":"10.1007","volume":"29","author":[{"given":"Surya Kant","family":"Yadav","sequence":"first","affiliation":[]},{"given":"Samir Kr.","family":"Borgohain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,10]]},"reference":[{"key":"1648_CR1","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199"},{"key":"1648_CR2","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572"},{"key":"1648_CR3","unstructured":"Dosovitskiy A, Beyer L, Kolesnikov A, Weissenborn D, Zhai X, Unterthiner T, Dehghani M, Minderer M, Heigold G, Gelly S et al. (2020) An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929"},{"key":"1648_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106755","volume":"125","author":"Y Wan","year":"2023","unstructured":"Wan Y, Shao M, Cheng Y, Meng D, Zuo W (2023) Progressive convolutional transformer for image restoration. Eng Appl Artif Intell 125:106755","journal-title":"Eng Appl Artif Intell"},{"issue":"12","key":"1648_CR5","doi-asserted-by":"publisher","first-page":"4501","DOI":"10.1109\/TFUZZ.2023.3287734","volume":"31","author":"Y Cheng","year":"2023","unstructured":"Cheng Y, Shao M, Wan Y, Liu Y, Liu H, Meng D (2023) Deep fuzzy clustering transformer: Learning the general property of corruptions for degradation-agnostic multitask image restoration. IEEE Trans Fuzzy Syst 31(12):4501\u20134515","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"1648_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2025.111504","volume":"164","author":"Y Wan","year":"2025","unstructured":"Wan Y, Shao M, Cheng Y, Liu Y, Bao Z (2025) Learning to restore arbitrary hybrid adverse weather conditions in one go. Pattern Recogn 164:111504","journal-title":"Pattern Recogn"},{"key":"1648_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.128896","volume":"615","author":"Q Ren","year":"2025","unstructured":"Ren Q, Wang J (2025) DoA-ViT: dual-objective affine vision transformer for data insufficiency. Neurocomputing 615:128896","journal-title":"Neurocomputing"},{"key":"1648_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.110967","volume":"158","author":"Y Li","year":"2025","unstructured":"Li Y, Chen D, Tang T, Shen X (2025) HTR-VT: handwritten text recognition with vision transformer. Pattern Recogn 158:110967","journal-title":"Pattern Recogn"},{"key":"1648_CR9","doi-asserted-by":"crossref","unstructured":"Mahmood K, Mahmood R, Van Dijk M (2021) On the robustness of vision transformers to adversarial examples. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 7838\u20137847","DOI":"10.1109\/ICCV48922.2021.00774"},{"key":"1648_CR10","doi-asserted-by":"crossref","unstructured":"Kim G, Kim J, Lee J-S (2024) Exploring adversarial robustness of vision transformers in the spectral perspective. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 3976\u20133985","DOI":"10.1109\/WACV57701.2024.00393"},{"key":"1648_CR11","unstructured":"Fu Y, Zhang S, Wu S, Wan C, Lin Y (2022) Patch-fool: Are vision transformers always robust against adversarial perturbations? arXiv preprint arXiv:2203.08392"},{"key":"1648_CR12","unstructured":"Joshi A, Jagatap G, Hegde C (2021) Adversarial token attacks on vision transformers. arXiv preprint arXiv:2110.04337"},{"key":"1648_CR13","doi-asserted-by":"crossref","unstructured":"Yang H, Jeong J, Yoon K-J (2024) Facl-attack: Frequency-aware contrastive learning for transferable adversarial attacks. In: Proceedings of the AAAI Conference on Artificial Intelligence 38:6494\u20136502","DOI":"10.1609\/aaai.v38i6.28470"},{"key":"1648_CR14","doi-asserted-by":"crossref","unstructured":"Fu Z, Li Y, Huang Y (2025) Frequency-guided adaptive gradient attack for transferable adversarial examples. In: Asian Conference on Pattern Recognition, 381\u2013396 . Springer","DOI":"10.1007\/978-981-95-4398-4_27"},{"key":"1648_CR15","unstructured":"Rahaman N, Baratin A, Arpit D, Draxler F, Lin M, Hamprecht F, Bengio Y, Courville A (2019) On the spectral bias of neural networks. In: International Conference on Machine Learning, 5301\u20135310 . PMLR"},{"key":"1648_CR16","unstructured":"Cao Y, Fang Z, Wu Y, Zhou D-X, Gu Q (2019) Towards understanding the spectral bias of deep learning. arXiv preprint arXiv:1912.01198"},{"key":"1648_CR17","doi-asserted-by":"crossref","unstructured":"Khrulkov V, Oseledets I (2018) Art of singular vectors and universal adversarial perturbations. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 8562\u20138570","DOI":"10.1109\/CVPR.2018.00893"},{"key":"1648_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2024.106467","volume":"178","author":"J Li","year":"2024","unstructured":"Li J, Hu Y, Yan C (2024) FDAA: a feature distribution-aware transferable adversarial attack method. Neural Netw 178:106467","journal-title":"Neural Netw"},{"key":"1648_CR19","unstructured":"Chen Z, Guo H, Jiang K, Fu J, Zhou X, Yang D, Tang H, Li B, Zhang W (2025) Boosting adversarial transferability with spatial adversarial alignment. arXiv preprint arXiv:2501.01015"},{"key":"1648_CR20","doi-asserted-by":"crossref","unstructured":"Dong Y, Liao F, Pang T, Su H, Zhu J, Hu X, Li J (2018) Boosting adversarial attacks with momentum. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 9185\u20139193","DOI":"10.1109\/CVPR.2018.00957"},{"key":"1648_CR21","doi-asserted-by":"crossref","unstructured":"Xie C, Zhang Z, Zhou Y, Bai S, Wang J, Ren Z, Yuille AL (2019) Improving transferability of adversarial examples with input diversity. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2730\u20132739","DOI":"10.1109\/CVPR.2019.00284"},{"key":"1648_CR22","doi-asserted-by":"crossref","unstructured":"Dong Y, Pang T, Su H, Zhu J (2019) Evading defenses to transferable adversarial examples by translation-invariant attacks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 4312\u20134321","DOI":"10.1109\/CVPR.2019.00444"},{"key":"1648_CR23","unstructured":"Lin J, Song C, He K, Wang L, Hopcroft JE (2019) Nesterov accelerated gradient and scale invariance for adversarial attacks. arXiv preprint arXiv:1908.06281"},{"key":"1648_CR24","unstructured":"Touvron H, Cord M, Douze M, Massa F, Sablayrolles A, J\u00e9gou H (2021) Training data-efficient image transformers & distillation through attention. In: International Conference on Machine Learning, 10347\u201310357. PMLR"},{"key":"1648_CR25","unstructured":"Bao H, Dong L, Piao S, Wei F (2021) Beit: Bert pre-training of image transformers. arXiv preprint arXiv:2106.08254"},{"key":"1648_CR26","doi-asserted-by":"crossref","unstructured":"Liu Z, Lin Y, Cao Y, Hu H, Wei Y, Zhang Z, Lin S, Guo B (2021) Swin transformer: Hierarchical vision transformer using shifted windows. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 10012\u201310022","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"1648_CR27","doi-asserted-by":"crossref","unstructured":"Graham B, El-Nouby A, Touvron H, Stock P, Joulin A, J\u00e9gou H, Douze M (2021) Levit: a vision transformer in convnet\u2019s clothing for faster inference. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 12259\u201312269","DOI":"10.1109\/ICCV48922.2021.01204"},{"key":"1648_CR28","doi-asserted-by":"crossref","unstructured":"Heo B, Yun S, Han D, Chun S, Choe J, Oh SJ (2021) Rethinking spatial dimensions of vision transformers. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 11936\u201311945","DOI":"10.1109\/ICCV48922.2021.01172"},{"key":"1648_CR29","doi-asserted-by":"crossref","unstructured":"Touvron H, Cord M, Sablayrolles A, Synnaeve G, J\u00e9gou H (2021) Going deeper with image transformers. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 32\u201342","DOI":"10.1109\/ICCV48922.2021.00010"},{"key":"1648_CR30","first-page":"15908","volume":"34","author":"K Han","year":"2021","unstructured":"Han K, Xiao A, Wu E, Guo J, Xu C, Wang Y (2021) Transformer in transformer. Adv Neural Inf Proc Syst 34:15908\u201315919","journal-title":"Adv Neural Inf Proc Syst"},{"key":"1648_CR31","doi-asserted-by":"crossref","unstructured":"d\u2019Ascoli S, Touvron H, Leavitt ML, Morcos AS, Biroli G, Sagun L (2021) Convit: Improving vision transformers with soft convolutional inductive biases. In: International Conference on Machine Learning, pp. 2286\u20132296 . PMLR","DOI":"10.1088\/1742-5468\/ac9830"},{"key":"1648_CR32","doi-asserted-by":"crossref","unstructured":"Chen Z, Xie L, Niu J, Liu X, Wei L, Tian Q (2021) Visformer: The vision-friendly transformer. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 589\u2013598","DOI":"10.1109\/ICCV48922.2021.00063"},{"key":"1648_CR33","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"1648_CR34","doi-asserted-by":"crossref","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2818\u20132826","DOI":"10.1109\/CVPR.2016.308"},{"key":"1648_CR35","unstructured":"Tan M, Le Q (2019) Efficientnet: Rethinking model scaling for convolutional neural networks. In: International Conference on Machine Learning, 6105\u20136114 . PMLR"},{"key":"1648_CR36","unstructured":"Liu Y, Chen X, Liu C, Song D (2016) Delving into transferable adversarial examples and black-box attacks. arXiv preprint arXiv:1611.02770"},{"key":"1648_CR37","unstructured":"Gu J, Jia X, Jorge P, Yu W, Liu X, Ma A, Xun Y, Hu A, Khakzar A, Li Z, et al. (2023) A survey on transferability of adversarial examples across deep neural networks. arXiv preprint arXiv:2310.17626"},{"key":"1648_CR38","doi-asserted-by":"crossref","unstructured":"Hwang J, Han D, Heo B, Park S, Chun S, Lee J-S (2024) Similarity of neural architectures using adversarial attack transferability. In: European Conference on Computer Vision, pp. 106\u2013126 . Springer","DOI":"10.1007\/978-3-031-73113-6_7"},{"key":"1648_CR39","doi-asserted-by":"crossref","unstructured":"Zheng M, Yan X, Zhu Z, Chen H, Wu B (2025) Blackboxbench: A comprehensive benchmark of black-box adversarial attacks. IEEE Transactions on Pattern Analysis and Machine Intelligence","DOI":"10.1109\/TPAMI.2025.3574432"},{"key":"1648_CR40","unstructured":"He W, Li B, Song D (2018) Decision boundary analysis of adversarial examples. In: International Conference on Learning Representations"},{"key":"1648_CR41","unstructured":"Guesmi A, Ouni B, Shafique M (2025) Tesser: Transfer-enhancing adversarial attacks from vision transformers via spectral and semantic regularization. arXiv preprint arXiv:2505.19613"},{"key":"1648_CR42","doi-asserted-by":"crossref","unstructured":"Altoub M, Mehmood R, AlQurashi F, Alqahtany S, Alsulami B (2024) A feature map adversarial attack against vision transformers. International Journal of Advanced Computer Science & Applications 15(10)","DOI":"10.14569\/IJACSA.2024.0151097"},{"key":"1648_CR43","doi-asserted-by":"crossref","unstructured":"Zhang J, Huang Y, Wu W, Lyu MR (2023) Transferable adversarial attacks on vision transformers with token gradient regularization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 16415\u201316424","DOI":"10.1109\/CVPR52729.2023.01575"},{"key":"1648_CR44","doi-asserted-by":"crossref","unstructured":"Wei Z, Chen J, Goldblum M, Wu Z, Goldstein T, Jiang Y-G (2022) Towards transferable adversarial attacks on vision transformers. In: Proceedings of the AAAI Conference on Artificial Intelligence 36:2668\u20132676","DOI":"10.1609\/aaai.v36i3.20169"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-026-01648-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10044-026-01648-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-026-01648-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T19:45:49Z","timestamp":1773171949000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10044-026-01648-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,10]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["1648"],"URL":"https:\/\/doi.org\/10.1007\/s10044-026-01648-5","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,10]]},"assertion":[{"value":"24 November 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"61"}}