{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,19]],"date-time":"2026-04-19T19:58:14Z","timestamp":1776628694848,"version":"3.51.2"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Grid Computing"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10723-023-09684-9","type":"journal-article","created":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T09:02:14Z","timestamp":1695373334000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["Adversarial Attacks on Visual Objects Using the Fast Gradient Sign Method"],"prefix":"10.1007","volume":"21","author":[{"given":"Syed Muhammad Ali","family":"Naqvi","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Shabaz","sequence":"additional","affiliation":[]},{"given":"Muhammad Attique","family":"Khan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6852-8993","authenticated-orcid":false,"given":"Syeda Iqra","family":"Hassan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,22]]},"reference":[{"key":"9684_CR1","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z.B., Swami, A.: Practical black-box attacks against machine learning. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 506\u2013519 (2017)","DOI":"10.1145\/3052973.3053009"},{"key":"9684_CR2","doi-asserted-by":"crossref","unstructured":"Wang, Q., Zhang, L., Bertinetto, L., Hu, W., Torr, P.H.: Fast online object tracking and segmentation: A unifying approach. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1328\u20131338 (2019)","DOI":"10.1109\/CVPR.2019.00142"},{"key":"9684_CR3","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., Fergus, R.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)"},{"key":"9684_CR4","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s11633-019-1211-x","volume":"17","author":"H Xu","year":"2020","unstructured":"Xu, H., Ma, Y., Liu, H.-C., Deb, D., Liu, H., Tang, J.-L., Jain, A.K.: Adversarial attacks and defenses in images, graphs and text: A review. Int. J. Autom. Comput. 17, 151\u2013178 (2020)","journal-title":"Int. J. Autom. Comput."},{"key":"9684_CR5","doi-asserted-by":"crossref","unstructured":"Bai, Y., Zeng, Y., Jiang, Y., Wang, Y., Xia, S.-T., Guo, W.: Improving query efficiency of black-box adversarial attack. In: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part XXV 16, pp. 101\u2013116 (2020). Springer","DOI":"10.1007\/978-3-030-58595-2_7"},{"issue":"9","key":"9684_CR6","doi-asserted-by":"publisher","first-page":"2805","DOI":"10.1109\/TNNLS.2018.2886017","volume":"30","author":"X Yuan","year":"2019","unstructured":"Yuan, X., He, P., Zhu, Q., Li, X.: Adversarial examples: Attacks and defenses for deep learning. IEEE Trans. Neural Netw. Learn. Syst. 30(9), 2805\u20132824 (2019)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"9684_CR7","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.-M., Fawzi, A., Frossard, P.: Deepfool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2574\u20132582 (2016)","DOI":"10.1109\/CVPR.2016.282"},{"key":"9684_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1214\/21-SS133","volume":"16","author":"C Rudin","year":"2022","unstructured":"Rudin, C., Chen, C., Chen, Z., Huang, H., Semenova, L., Zhong, C.: Interpretable machine learning: Fundamental principles and 10 grand challenges. Stat. Surv. 16, 1\u201385 (2022)","journal-title":"Stat. Surv."},{"issue":"5","key":"9684_CR9","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","volume":"23","author":"J Su","year":"2019","unstructured":"Su, J., Vargas, D.V., Sakurai, K.: One pixel attack for fooling deep neural networks. IEEE Trans. Evol. Comput. 23(5), 828\u2013841 (2019)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"9684_CR10","unstructured":"Jin, D., Jin, Z., Zhou, J.T., Szolovits, P.: TextFool: fool your model with natural adversarial text (2019)"},{"key":"9684_CR11","doi-asserted-by":"crossref","unstructured":"Xie, C., Wang, J., Zhang, Z., Zhou, Y., Xie, L., Yuille, A.: Adversarial examples for semantic segmentation and object detection. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 1369\u20131378 (2017)","DOI":"10.1109\/ICCV.2017.153"},{"issue":"1","key":"9684_CR12","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/89.650310","volume":"6","author":"L Lee","year":"1998","unstructured":"Lee, L., Rose, R.: A frequency warping approach to speaker normalization. IEEE Trans. Speech Audio Process. 6(1), 49\u201360 (1998)","journal-title":"IEEE Trans. Speech Audio Process."},{"key":"9684_CR13","doi-asserted-by":"crossref","unstructured":"Gao, J., Yan, D., Dong, M.: On the robustness of speech emotion models to black-box adversarial attack (2022)","DOI":"10.21203\/rs.3.rs-1549399\/v1"},{"key":"9684_CR14","doi-asserted-by":"crossref","unstructured":"Xie, C., Zhang, Z., Zhou, Y., Bai, S., Wang, J., Ren, Z., Yuille, A.L.: Improving transferability of adversarial examples with input diversity. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2730\u20132739 (2019)","DOI":"10.1109\/CVPR.2019.00284"},{"key":"9684_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, M., Zhang, Y., Zhang, L., Liu, C., Khurshid, S.: Deeproad: Gan-based metamorphic testing and input validation framework for autonomous driving systems. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 132\u2013142 (2018)","DOI":"10.1145\/3238147.3238187"},{"key":"9684_CR16","doi-asserted-by":"crossref","unstructured":"Li, X., Li, F.: Adversarial examples detection in deep networks with convolutional filter statistics. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 5764\u20135772 (2017)","DOI":"10.1109\/ICCV.2017.615"},{"key":"9684_CR17","unstructured":"Feinman, R., Curtin, R.R., Shintre, S., Gardner, A.B.: Detecting adversarial samples from artifacts. arXiv preprint arXiv:1703.00410 (2017)"},{"key":"9684_CR18","doi-asserted-by":"crossref","unstructured":"Tian, S., Yang, G., Cai, Y.: Detecting adversarial examples through image transformation. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 32 (2018)","DOI":"10.1609\/aaai.v32i1.11828"},{"key":"9684_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102695","volume":"117","author":"H Kwon","year":"2022","unstructured":"Kwon, H., Lee, S.: Ensemble transfer attack targeting text classification systems. Comput. Secur. 117, 102695 (2022)","journal-title":"Comput. Secur."},{"key":"9684_CR20","unstructured":"Ma, X., Li, B., Wang, Y., Erfani, S.M., Wijewickrema, S., Schoenebeck, G., Song, D., Houle, M.E., Bailey, J.: Characterizing adversarial subspaces using local intrinsic dimensionality. arXiv preprint arXiv:1801.02613 (2018)"},{"key":"9684_CR21","doi-asserted-by":"crossref","unstructured":"Sandler, M., Howard, A., Zhu, M., Zhmoginov, A., Chen, L.-C.: Mobilenetv2: Inverted residuals and linear bottlenecks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4510\u20134520 (2018)","DOI":"10.1109\/CVPR.2018.00474"},{"key":"9684_CR22","doi-asserted-by":"crossref","unstructured":"Mao, G., Li, L., Wang, Q., Li, J.: Study on the method of adversarial example attack based on mi-fgsm. In: Advances in Intelligent Information Hiding and Multimedia Signal Processing: Proceeding of the IIH-MSP 2021 & FITAT 2021, Kaohsiung, Taiwan, Volume 1, pp. 281\u2013288. Springer, 978-981-19-1057-9 (2022)","DOI":"10.1007\/978-981-19-1057-9_27"},{"key":"9684_CR23","doi-asserted-by":"crossref","unstructured":"Yu, M., Sun, S.: Fe-dast: Fast and effective data-free substitute training for blackbox adversarial attacks. Comput. Secur. 113, 102555 (2022)","DOI":"10.1016\/j.cose.2021.102555"},{"issue":"11","key":"9684_CR24","doi-asserted-by":"publisher","first-page":"4059","DOI":"10.1109\/TPAMI.2020.2995190","volume":"43","author":"W Yang","year":"2020","unstructured":"Yang, W., Tan, R.T., Wang, S., Fang, Y., Liu, J.: Single image deraining: From model-based to data-driven and beyond. IEEE Trans. Pattern Anal. Mach. Intell. 43(11), 4059\u20134077 (2020)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"9","key":"9684_CR25","doi-asserted-by":"publisher","first-page":"2805","DOI":"10.1109\/TNNLS.2018.2886017","volume":"30","author":"X Yuan","year":"2019","unstructured":"Yuan, X., He, P., Zhu, Q., Li, X.: Adversarial examples: Attacks and defenses for deep learning. IEEE Trans. Neural Netw. Learn. Syst. 30(9), 2805\u20132824 (2019)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"9684_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, H., Patel, V.M.: Density-aware single image de-raining using a multistream dense network. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 695\u2013704 (2018)","DOI":"10.1109\/CVPR.2018.00079"},{"issue":"11","key":"9684_CR27","doi-asserted-by":"publisher","first-page":"3943","DOI":"10.1109\/TCSVT.2019.2920407","volume":"30","author":"H Zhang","year":"2019","unstructured":"Zhang, H., Sindagi, V., Patel, V.M.: Image de-raining using a conditional generative adversarial network. IEEE Trans. Circuits Syst. Video Technol. 30(11), 3943\u20133956 (2019)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"9684_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103612","volume":"82","author":"J Liu","year":"2022","unstructured":"Liu, J., Zhang, Q., Mo, K., Xiang, X., Li, J., Cheng, D., Gao, R., Liu, B., Chen, K., Wei, G.: An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient. Comput. Stand. Interfaces 82, 103612 (2022)","journal-title":"Comput. Stand. Interfaces"},{"key":"9684_CR29","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.ins.2022.11.007","volume":"619","author":"S Lu","year":"2023","unstructured":"Lu, S., Wang, M., Wang, D., Wei, X., Xiao, S., Wang, Z., Han, N., Wang, L.: Black-box attacks against log anomaly detection with adversarial examples. Inf. Sci. 619, 249\u2013262 (2023)","journal-title":"Inf. Sci."},{"key":"9684_CR30","doi-asserted-by":"crossref","unstructured":"Wang, J., Wang, C., Lin, Q., Luo, C., Wu, C., Li, J.: Adversarial attacks and defenses in deep learning for image recognition: A survey. Neurocomputing (2022)","DOI":"10.1016\/j.neucom.2022.09.004"},{"key":"9684_CR31","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, J., Lin, Q.: Adversarial attacks and defenses in deep learning: A survey. In: Intelligent Computing Theories and Application: 17th International Conference, ICIC 2021, Shenzhen, China, August 12\u201315, 2021, Proceedings, Part I 17, pp. 450\u2013461 (2021). Springer","DOI":"10.1007\/978-3-030-84522-3_37"},{"key":"9684_CR32","doi-asserted-by":"crossref","unstructured":"Grosse, K., Papernot, N., Manoharan, P., Backes, M., McDaniel, P.: Adversarial perturbations against deep neural networks for malware classification. arXiv preprint arXiv:1606.04435 (2016)","DOI":"10.1109\/SP.2016.41"},{"key":"9684_CR33","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial examples in the physical world. In: Artificial Intelligence Safety and Security, pp. 99\u2013112. Chapman and Hall\/CRC, arXiv:1607.02533 (2018)","DOI":"10.1201\/9781351251389-8"},{"key":"9684_CR34","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"9684_CR35","unstructured":"Linzen, T., Chrupa la, G., Belinkov, Y., Hupkes, D.: Proceedings of the 2019 acl workshop blackboxnlp: Analyzing and interpreting neural networks for nlp. In: Proceedings of the 2019 ACL Workshop BlackboxNLP: Analyzing and Interpreting Neural Networks for NLP (2019)"},{"key":"9684_CR36","unstructured":"Yin, X., Kolouri, S., Rohde, G.K.: Divide-and-conquer adversarial detection. CoRR, abs\/1905.11475 arXiv:1905.11475 (2019)"},{"key":"9684_CR37","doi-asserted-by":"crossref","unstructured":"Shumailov, I., Zhao, Y., Mullins, R., Anderson, R.: Towards certifiable adversarial sample detection. In: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, pp. 13\u201324 (2020)","DOI":"10.1145\/3411508.3421381"},{"key":"9684_CR38","unstructured":"Vacanti, G., Van Looveren, A.: Adversarial detection and correction by matching prediction distributions. arXiv preprint arXiv:2002.09364 (2020)"},{"key":"9684_CR39","doi-asserted-by":"crossref","unstructured":"Freitas, S., Chen, S.-T., Wang, Z.J., Chau, D.H.: Unmask: Adversarial detection and defense through robust feature alignment. In: 2020 IEEE International Conference on Big Data (Big Data), pp. 1081\u20131088 (2020). IEEE","DOI":"10.1109\/BigData50022.2020.9378303"},{"key":"9684_CR40","unstructured":"v2, M.: Dataset. https:\/\/storage.googleapis.com\/tensorflow\/keras-applications\/mobilenet_v2\/mobilenet_v2_weights_tf_dim_ordering_tf_kernels_1.0_224.h5. [MobileNet v2] (2018)"},{"key":"9684_CR41","doi-asserted-by":"crossref","unstructured":"Yang, W., Tan, R.T., Feng, J., Liu, J., Guo, Z., Yan, S.: Deep joint rain detection and removal from a single image. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1357\u20131366 (2017)","DOI":"10.1109\/CVPR.2017.183"},{"key":"9684_CR42","doi-asserted-by":"crossref","unstructured":"Xie, X., Ma, L., Wang, H., Li, Y., Liu, Y., Li, X.: Diffchaser: Detecting disagreements for deep neural networks. International Joint Conferences on Artificial Intelligence Organization (2019)","DOI":"10.24963\/ijcai.2019\/800"},{"issue":"6","key":"9684_CR43","doi-asserted-by":"publisher","first-page":"2948","DOI":"10.1109\/TIP.2019.2892685","volume":"28","author":"W Yang","year":"2019","unstructured":"Yang, W., Liu, J., Yang, S., Guo, Z.: Scale-free single image deraining via visibility-enhanced recurrent wavelet learning. IEEE Trans. Image Process. 28(6), 2948\u20132961 (2019)","journal-title":"IEEE Trans. Image Process."},{"key":"9684_CR44","doi-asserted-by":"crossref","unstructured":"Xie, X., Ma, L., Juefei-Xu, F., Xue, M., Chen, H., Liu, Y., Zhao, J., Li, B., Yin, J., See, S.: Deephunter: a coverage-guided fuzz testing framework for deep neural networks. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 146\u2013157 (2019)","DOI":"10.1145\/3293882.3330579"}],"container-title":["Journal of Grid Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-023-09684-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10723-023-09684-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-023-09684-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,26]],"date-time":"2023-12-26T19:08:09Z","timestamp":1703617689000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10723-023-09684-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,22]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["9684"],"URL":"https:\/\/doi.org\/10.1007\/s10723-023-09684-9","relation":{},"ISSN":["1570-7873","1572-9184"],"issn-type":[{"value":"1570-7873","type":"print"},{"value":"1572-9184","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,22]]},"assertion":[{"value":"30 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"52"}}