{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:52:15Z","timestamp":1764240735745,"version":"3.37.3"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T00:00:00Z","timestamp":1702512000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T00:00:00Z","timestamp":1702512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Advanced Cryptography and System Security Key Laboratory of Sichuan Province","award":["No. SKLACSS-202215"],"award-info":[{"award-number":["No. SKLACSS-202215"]}]},{"DOI":"10.13039\/501100012166","name":"National Key R &D Program of China","doi-asserted-by":"crossref","award":["No.J2019-V-0001-0092"],"award-info":[{"award-number":["No.J2019-V-0001-0092"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Major Science and Technology Project of Sichuan Province","award":["No. 2022YFG0174"],"award-info":[{"award-number":["No. 2022YFG0174"]}]},{"name":"Innovative Research Foundation of Ship General Performance","award":["No. 26422206"],"award-info":[{"award-number":["No. 26422206"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s10489-023-05171-6","type":"journal-article","created":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T13:03:18Z","timestamp":1702558998000},"page":"428-442","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Channel-augmented joint transformation for transferable adversarial attacks"],"prefix":"10.1007","volume":"54","author":[{"given":"Desheng","family":"Zheng","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2068-3198","authenticated-orcid":false,"given":"Wuping","family":"Ke","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaoyu","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shibin","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guangqiang","family":"Yin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weizhong","family":"Qian","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yong","family":"Zhou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fan","family":"Min","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shan","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,12,14]]},"reference":[{"issue":"4","key":"5171_CR1","doi-asserted-by":"crossref","first-page":"5314","DOI":"10.1109\/TPAMI.2022.3206148","volume":"45","author":"H Touvron","year":"2022","unstructured":"Touvron H, Bojanowski P, Caron M, Cord M, El-Nouby A, Grave E, Izacard G, Joulin A, Synnaeve G, Verbeek J et al (2022) Resmlp: Feedforward networks for image classi cation with data-efficient training. IEEE Trans Pattern Anal Mach Intell 45(4):5314\u20135321","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"2","key":"5171_CR2","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/s11263-022-01710-9","volume":"131","author":"S Shi","year":"2023","unstructured":"Shi S, Jiang L, Deng J, Wang Z, Guo C, Shi J, Wang X, Li H (2023) Pv-rcnn++: Point-voxel feature set abstraction with local vector rep- resentation for 3d object detection. Int J Comput Vis 131(2):531\u2013551","journal-title":"Int J Comput Vis"},{"issue":"2","key":"5171_CR3","doi-asserted-by":"publisher","first-page":"2367","DOI":"10.1109\/TPAMI.2022.3166905","volume":"45","author":"Y Chen","year":"2022","unstructured":"Chen Y, Zhang P, Kong T, Li Y, Zhang X, Qi L, Sun J, Jia J (2022) Scale-aware automatic augmentations for object detection with dynamic training. IEEE Trans Pattern Anal Mach Intell 45(2):2367\u20132383","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"4","key":"5171_CR4","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1007\/s11263-022-01738-x","volume":"131","author":"Y Zang","year":"2023","unstructured":"Zang Y, Zhou K, Huang C, Loy CC (2023) Semi-supervised and long-tailed object detection with cascadematch. Int J Comput Vision 131(4):987\u20131001","journal-title":"Int J Comput Vision"},{"key":"5171_CR5","doi-asserted-by":"crossref","unstructured":"Mao J, Shi S, Wang X, Li H (2023) 3d object detection for autonomous driving: A comprehensive survey. Int J Comput Vis pp 1\u201355","DOI":"10.1007\/s11263-023-01790-1"},{"key":"5171_CR6","doi-asserted-by":"crossref","unstructured":"Wang H, Liang H, Li Z, Zhou P, Chen L (2023) A fast coarse-to-fine point cloud registration based on optical flow for autonomous vehicles. Appl Intell pp 1\u201318","DOI":"10.1007\/s10489-022-04308-3"},{"key":"5171_CR7","doi-asserted-by":"crossref","unstructured":"Wang Y, Mao Q, Zhu H, Deng J, Zhang Y, Ji J, Li H, Zhang Y (2023) Multi-modal 3d object detection in autonomous driving: a survey. Int J Comput Vis pp 1\u201331","DOI":"10.1007\/s11263-023-01784-z"},{"key":"5171_CR8","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2014) Intriguing properties of neural networks. In: ICLR"},{"issue":"1","key":"5171_CR9","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/s11263-022-01701-w","volume":"131","author":"E Kazemi","year":"2023","unstructured":"Kazemi E, Kerdreux T, Wang L (2023) Minimally distorted structured adversarial attacks. Int J Comput Vision 131(1):160\u2013176","journal-title":"Int J Comput Vision"},{"key":"5171_CR10","doi-asserted-by":"crossref","unstructured":"Wei X, Guo Y, Yu J, Zhang B (2022) Simultaneously optimizing perturbations and positions for black-box adversarial patch attacks. IEEE Transactions on pattern analysis and machine intelligence","DOI":"10.1109\/TPAMI.2022.3231886"},{"issue":"3","key":"5171_CR11","doi-asserted-by":"publisher","first-page":"3632","DOI":"10.1109\/TPAMI.2022.3181972","volume":"45","author":"D Stutz","year":"2022","unstructured":"Stutz D, Chandramoorthy N, Hein M, Schiele B (2022) Random and adversarial bit error robustness: Energy-efficient and secure dnn accelerators. IEEE Trans Pattern Anal Mach Intell 45(3):3632\u20133647","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"5171_CR12","doi-asserted-by":"crossref","unstructured":"Li X, Wang Z, Zhang B, Sun F, Hu X (2023) Recognizing object by components with human prior knowledge enhances adversarial robustness of deep neural networks. IEEE Trans Pattern Anal Mach Intell","DOI":"10.1109\/TPAMI.2023.3237935"},{"issue":"2","key":"5171_CR13","doi-asserted-by":"publisher","first-page":"2645","DOI":"10.1109\/TPAMI.2022.3169217","volume":"45","author":"S Lee","year":"2022","unstructured":"Lee S, Kim H, Lee J (2022) Graddiv: Adversarial robustness of randomized neural networks via gradient diversity regularization. IEEE Trans Pattern Anal Mach Intell 45(2):2645\u20132651","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"5171_CR14","doi-asserted-by":"crossref","unstructured":"Wang D, Jin W, Wu Y, Khan A (2023) Atgan: Adversarial training-based gan for improving adversarial robustness generalization on image classification. Appl Intell pp 1\u201317","DOI":"10.1007\/s10489-023-04847-3"},{"key":"5171_CR15","unstructured":"Guo C, Gardner J, You Y, Wilson AG, Weinberger K (2019) Simple black-box adversarial attacks. In: ICML"},{"key":"5171_CR16","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572"},{"key":"5171_CR17","doi-asserted-by":"crossref","unstructured":"Kurakin A, Goodfellow IJ, Bengio S (2018) Adversarial examples in the physical world. In: Artificial intelligence safety and security","DOI":"10.1201\/9781351251389-8"},{"key":"5171_CR18","doi-asserted-by":"crossref","unstructured":"Dong Y, Liao F, Pang T, Su H, Zhu J, Hu X, Li J (2018) Boosting adversarial attacks with momentum. In: CVPR","DOI":"10.1109\/CVPR.2018.00957"},{"key":"5171_CR19","doi-asserted-by":"crossref","unstructured":"Wang Z, Guo H, Zhang Z, Liu W, Qin Z, Ren K (2021) Feature importance-aware transferable adversarial attacks. In: ICCV","DOI":"10.1109\/ICCV48922.2021.00754"},{"key":"5171_CR20","doi-asserted-by":"crossref","unstructured":"Zhang J, Wu W, Huang J-t, Huang Y, Wang W, Su Y, Lyu MR (2022) Improving adversarial transferability via neuron attribution-based attacks. In: CVPR","DOI":"10.1109\/CVPR52688.2022.01457"},{"key":"5171_CR21","doi-asserted-by":"crossref","unstructured":"Zhang Y, Tan Y-a, Chen T, Liu X, Zhang Q, Li Y (2022) Enhancing the transferability of adversarial examples with random patch. In: IJCAI","DOI":"10.24963\/ijcai.2022\/233"},{"key":"5171_CR22","doi-asserted-by":"crossref","unstructured":"Wang X, He K (2021) Enhancing the transferability of adversarial attacks through variance tuning. In: CVPR","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"5171_CR23","doi-asserted-by":"crossref","unstructured":"Xie C, Zhang Z, Zhou Y, Bai S, Wang J, Ren Z, Yuille AL (2019) Improving transferability of adversarial examples with input diversity. In: CVPR","DOI":"10.1109\/CVPR.2019.00284"},{"key":"5171_CR24","doi-asserted-by":"crossref","unstructured":"Dong Y, Pang T, Su H, Zhu J (2019) Evading defenses to transferable adversarial examples by translation-invariant attacks. In: CVPR","DOI":"10.1109\/CVPR.2019.00444"},{"key":"5171_CR25","unstructured":"Lin J, Song C, He K, Wang L, Hopcroft JE (2019) Nesterov accelerated gradient and scale invariance for adversarial attacks. In: ICLR"},{"key":"5171_CR26","doi-asserted-by":"crossref","unstructured":"Wu W, Su Y, Lyu MR, King I (2021) Improving the transferability of adversarial samples with adversarial transformations. In: CVPR","DOI":"10.1109\/CVPR46437.2021.00891"},{"key":"5171_CR27","doi-asserted-by":"crossref","unstructured":"Yang J, Zhang Z, Xiao S, Ma S, Li Y, Lu W, Gao X (2023) Efficient data-driven behavior identification based on vision transformers for human activity understanding. Neurocomputing 530:104\u2013115","DOI":"10.1016\/j.neucom.2023.01.067"},{"key":"5171_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2022.108782","volume":"203","author":"Y Zhao","year":"2023","unstructured":"Zhao Y, Xiao S, Yang J, Lu W, Gao X (2023) No-reference qquality index of tone-mapped images based on authenticity, preservation, and scene expressiveness. Signal Process 203:108782","journal-title":"Signal Process"},{"key":"5171_CR29","doi-asserted-by":"publisher","first-page":"6434","DOI":"10.1109\/TIP.2021.3093795","volume":"30","author":"J Qiu","year":"2021","unstructured":"Qiu J, Chen C, Liu S, Zhang H-Y, Zeng B (2021) Slimconv: Reducing channel redundancy in convolutional neural networks by features recombining. IEEE Trans Image Process 30:6434\u20136445","journal-title":"IEEE Trans Image Process"},{"key":"5171_CR30","unstructured":"Liu Y, Chen X, Liu C, Song D (2016) Delving into transferable adversarial examples and black-box attacks. In: ICLR"},{"key":"5171_CR31","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2018) Towards deep learning models resistant to adversarial attacks. In: ICLR"},{"key":"5171_CR32","doi-asserted-by":"crossref","unstructured":"Liu Z, Liu Q, Liu T, Xu N, Lin X, Wang Y, Wen W (2019) Feature distillation: Dnn-oriented jpeg compression against adversarial examples. In: CVPR","DOI":"10.1109\/CVPR.2019.00095"},{"key":"5171_CR33","unstructured":"Guo, C., Rana, M., Cisse, M., van\u00a0der Maaten, L.: Countering adversarial images using input transformations. In: ICLR (2018)"},{"key":"5171_CR34","unstructured":"Kingma DP, Ba J (2014) Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980"},{"key":"5171_CR35","doi-asserted-by":"crossref","unstructured":"Cao J, Luo M, Yu J, Yang M-H, He R (2022) Scoremix: A scalable augmentation strategy for training gans with limited data. IEEE Transactions on pattern analysis and machine intelligence","DOI":"10.1109\/TPAMI.2022.3231649"},{"key":"5171_CR36","doi-asserted-by":"crossref","unstructured":"Li D, Hu J, Wang C, Li X, She Q, Zhu L, Zhang T, Chen Q (2021) Involution: Inverting the inherence of convolution for visual recognition. In: CVPR","DOI":"10.1109\/CVPR46437.2021.01214"},{"key":"5171_CR37","doi-asserted-by":"crossref","unstructured":"Deng J, Dong W, Socher R, Li L-J, Li K, Fei-Fei L (2009) Imagenet: A large-scale hierarchical image database. In: CVPR","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"5171_CR38","doi-asserted-by":"crossref","unstructured":"Wu W, Su Y, Chen X, Zhao S, King I, Lyu MR, Tai Y-W (2020) Boosting the transferability of adversarial samples via attention. In: CVPR","DOI":"10.1109\/CVPR42600.2020.00124"},{"key":"5171_CR39","doi-asserted-by":"crossref","unstructured":"Wang X, He X, Wang J, He K (2021) Admix: Enhancing the transferability of adversarial attacks. In: ICCV","DOI":"10.1109\/ICCV48922.2021.01585"},{"key":"5171_CR40","doi-asserted-by":"crossref","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) Rethinking the inception architecture for computer vision. In: CVPR","DOI":"10.1109\/CVPR.2016.308"},{"key":"5171_CR41","doi-asserted-by":"crossref","unstructured":"Szegedy C, Ioffe S, Vanhoucke V, Alemi A (2017) Inception-v4, inception-resnet and the impact of residual connections on learning. In: AAAI","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"5171_CR42","unstructured":"Tramr F, Kurakin A, Papernot N, Goodfellow I, Boneh D, McDaniel P (2018) Ensemble adversarial training: Attacks and defenses. In: ICLR"},{"key":"5171_CR43","doi-asserted-by":"crossref","unstructured":"Liao F, Liang M, Dong Y, Pang T, Hu X, Zhu J (2018) Defense against adversarial attacks using high-level representation guided denoiser. In: CVPR","DOI":"10.1109\/CVPR.2018.00191"},{"key":"5171_CR44","unstructured":"Xie C, Wang J, Zhang Z, Ren Z, Yuille A (2018) Mitigating adversarial effects through randomization. In: International conference on learning representations"},{"key":"5171_CR45","doi-asserted-by":"crossref","unstructured":"Gu S, Yi P, Zhu T, Yao Y, Wang W (2019) Detecting adversarial examples in deep neural networks using normalizing filters. UMBC Stud Collect","DOI":"10.5220\/0007370301640173"},{"key":"5171_CR46","unstructured":"Salman H, Li J, Razenshteyn I, Zhang P, Zhang H, Bubeck S, Yang G (2019) Provably robust deep learning via adversarially trained smoothed classifiers. Adv Neural Inform Process Syst 32"},{"key":"5171_CR47","unstructured":"Cohen J, Rosenfeld E, Kolter Z (2019) Certified adversarial robustness via randomized smoothing. In: ICML"},{"key":"5171_CR48","doi-asserted-by":"crossref","unstructured":"Naseer M, Khan S, Hayat M, Khan FS, Porikli F (2020) A self-supervised approach for adversarial robustness. In: CVPR","DOI":"10.1109\/CVPR42600.2020.00034"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-023-05171-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-023-05171-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-023-05171-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T23:52:40Z","timestamp":1730850760000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-023-05171-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,14]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["5171"],"URL":"https:\/\/doi.org\/10.1007\/s10489-023-05171-6","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2023,12,14]]},"assertion":[{"value":"10 November 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests"}}]}}