{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T07:26:09Z","timestamp":1776842769718,"version":"3.51.2"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2022,3,17]],"date-time":"2022-03-17T00:00:00Z","timestamp":1647475200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,17]],"date-time":"2022-03-17T00:00:00Z","timestamp":1647475200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s11042-022-12007-x","type":"journal-article","created":{"date-parts":[[2022,3,17]],"date-time":"2022-03-17T22:02:33Z","timestamp":1647554553000},"page":"21919-21938","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Generating unrestricted adversarial examples via three parameteres"],"prefix":"10.1007","volume":"81","author":[{"given":"Hanieh","family":"Naderi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Leili","family":"Goli","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3831-0878","authenticated-orcid":false,"given":"Shohreh","family":"Kasaei","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,3,17]]},"reference":[{"key":"12007_CR1","unstructured":"Alaifari R, Alberti GS, Gauksson T (2018) Adef: an iterative algorithm to construct adversarial deformations. arXiv:180407729"},{"key":"12007_CR2","doi-asserted-by":"crossref","unstructured":"Alcorn MA, Li Q, Gong Z, Wang C, Mai L, Ku WS, Nguyen A (2019) Strike (with) a pose: Neural networks are easily fooled by strange poses of familiar objects. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 4845\u20134854","DOI":"10.1109\/CVPR.2019.00498"},{"key":"12007_CR3","unstructured":"Athalye A, Carlini N, Wagner D (2018) Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. In: International conference on machine learning, PMLR, pp 274\u2013283"},{"key":"12007_CR4","unstructured":"Bhattad A, Chong MJ, Liang K, Li B, Forsyth DA (2019) Unrestricted adversarial examples via semantic manipulation. arXiv:190406347"},{"key":"12007_CR5","unstructured":"Brown TB, Man\u00e9 D, Roy A, Abadi M, Gilmer J (2017) Adversarial patch. arXiv:171209665"},{"key":"12007_CR6","unstructured":"Brown TB, Carlini N, Zhang C, Olsson C, Christiano P, Goodfellow I (2018) Unrestricted adversarial examples. arXiv:180908352"},{"key":"12007_CR7","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 Ieee symposium on security and privacy (sp). IEEE, pp 39\u201357","DOI":"10.1109\/SP.2017.49"},{"key":"12007_CR8","unstructured":"Cohen T, Welling M (2016) Group equivariant convolutional networks. In: International conference on machine learning. PMLR, pp 2990\u20132999"},{"key":"12007_CR9","doi-asserted-by":"crossref","unstructured":"Dai J, Qi H, Xiong Y, Li Y, Zhang G, Hu H, Wei Y (2017) Deformable convolutional networks. In: Proceedings of the IEEE international conference on computer vision, pp 764\u2013773","DOI":"10.1109\/ICCV.2017.89"},{"key":"12007_CR10","doi-asserted-by":"crossref","unstructured":"Dargan S, Kumar M, Ayyagari MR (2019) Kumar g. a survey of deep learning and its applications: a new paradigm to machine learning. Arch Comput Methods Eng:1\u201322","DOI":"10.1007\/s11831-019-09344-w"},{"issue":"6","key":"12007_CR11","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/MSP.2012.2211477","volume":"29","author":"L Deng","year":"2012","unstructured":"Deng L (2012) The mnist database of handwritten digit images for machine learning research [best of the web]. IEEE Signal Proc Mag 29(6):141\u2013142","journal-title":"IEEE Signal Proc Mag"},{"key":"12007_CR12","doi-asserted-by":"crossref","unstructured":"Dong Y, Liao F, Pang T, Su H, Zhu J, Hu X, Li J (2018) Boosting adversarial attacks with momentum. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 9185\u20139193","DOI":"10.1109\/CVPR.2018.00957"},{"key":"12007_CR13","unstructured":"Engstrom L, Tsipras D, Schmidt L, Madry A (2017) A rotation and a translation suffice: Fooling cnns with simple transformations. arXiv:171202779 1(2):3"},{"key":"12007_CR14","unstructured":"Engstrom L, Tran B, Tsipras D, Schmidt L, Madry A (2019) Exploring the landscape of spatial robustness. In: International conference on machine learning. PMLR, pp 1802\u20131811"},{"key":"12007_CR15","doi-asserted-by":"crossref","unstructured":"Eykholt K, Evtimov I, Fernandes E, Li B, Rahmati A, Xiao C, Prakash A, Kohno T, Song D (2018) Robust physical-world attacks on deep learning visual classification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 1625\u20131634","DOI":"10.1109\/CVPR.2018.00175"},{"key":"12007_CR16","doi-asserted-by":"crossref","unstructured":"Fawzi A, Frossard P. (2015) Manitest: Are classifiers really invariant? arXiv:150706535","DOI":"10.5244\/C.29.106"},{"key":"12007_CR17","unstructured":"Goodfellow I, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv:14126572"},{"key":"12007_CR18","doi-asserted-by":"crossref","unstructured":"Gupta S, Mohan N, Kumar M (2020) A study on source device attribution using still images. Arch Comput Methods Eng:1\u201315","DOI":"10.1007\/s11831-020-09452-y"},{"key":"12007_CR19","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"12007_CR20","doi-asserted-by":"crossref","unstructured":"Ho CH, Leung B, Sandstrom E, Chang Y, Vasconcelos N (2019) Catastrophic child\u2019s play: easy to perform, hard to defend adversarial attacks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 9229\u20139237","DOI":"10.1109\/CVPR.2019.00945"},{"key":"12007_CR21","doi-asserted-by":"crossref","unstructured":"Hosseini H, Poovendran R (2018) Semantic adversarial examples. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp 1614\u20131619","DOI":"10.1109\/CVPRW.2018.00212"},{"key":"12007_CR22","doi-asserted-by":"crossref","unstructured":"Huq A, Pervin MT (2020) Analysis of adversarial attacks on skin cancer recognition. In: 2020 International conference on data science and its applications (ICoDSA). IEEE, pp 1\u20134","DOI":"10.1109\/ICoDSA50139.2020.9212850"},{"key":"12007_CR23","unstructured":"Jaderberg M, Simonyan K, Zisserman A et al (2015) Spatial transformer networks. In: Advances in neural information processing systems, pp 2017\u20132025"},{"key":"12007_CR24","doi-asserted-by":"crossref","unstructured":"Kanbak C, Moosavi-Dezfooli SM, Frossard P (2018) Geometric robustness of deep networks: analysis and improvement. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 4441\u20134449","DOI":"10.1109\/CVPR.2018.00467"},{"key":"12007_CR25","unstructured":"Krizhevsky A, Hinton G et al (2009) Learning multiple layers of features from tiny images. Master\u2019s thesis, Department of Computer Science University of Toronto"},{"key":"12007_CR26","first-page":"1097","volume":"25","author":"A Krizhevsky","year":"2012","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. Adv Neural Inf Process Syst 25:1097\u20131105","journal-title":"Adv Neural Inf Process Syst"},{"issue":"3","key":"12007_CR27","doi-asserted-by":"publisher","first-page":"2075","DOI":"10.1007\/s10462-019-09727-2","volume":"53","author":"M Kumar","year":"2020","unstructured":"Kumar M, Jindal MK, Sharma RK, Jindal SR (2020) Performance evaluation of classifiers for the recognition of offline handwritten gurmukhi characters and numerals: a study. Artif Intell Rev 53(3):2075\u20132097","journal-title":"Artif Intell Rev"},{"key":"12007_CR28","unstructured":"Kurakin A, Goodfellow I, Bengio S (2016) Adversarial machine learning at scale. arXiv:161101236"},{"key":"12007_CR29","doi-asserted-by":"crossref","unstructured":"Laptev D, Savinov N, Buhmann JM, Pollefeys M (2016) Ti-pooling: transformation-invariant pooling for feature learning in convolutional neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 289\u2013297","DOI":"10.1109\/CVPR.2016.38"},{"issue":"11","key":"12007_CR30","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278\u20132324","journal-title":"Proc IEEE"},{"key":"12007_CR31","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2017) Towards deep learning models resistant to adversarial attacks. arXiv:170606083"},{"key":"12007_CR32","doi-asserted-by":"crossref","unstructured":"Marcos D, Volpi M, Komodakis N, Tuia D (2017) Rotation equivariant vector field networks. In: Proceedings of the IEEE International Conference on Computer Vision, pp 5048\u20135057","DOI":"10.1109\/ICCV.2017.540"},{"key":"12007_CR33","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli SM, Fawzi A, Frossard P (2016) Deepfool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2574\u20132582","DOI":"10.1109\/CVPR.2016.282"},{"key":"12007_CR34","doi-asserted-by":"crossref","unstructured":"Naderi H, Goli L, Kasaei S (2020) Scale equivariant cnns with scale steerable filters. In: 2020 International conference on machine vision and image processing (MVIP). IEEE, pp 1\u20135","DOI":"10.1109\/MVIP49855.2020.9116889"},{"key":"12007_CR35","unstructured":"Netzer Y, Wang T, Coates A, Bissacco A, Wu B, Ng AY (2011) Reading digits in natural images with unsupervised feature learning. Advances in Neural Information Processing Systems"},{"key":"12007_CR36","unstructured":"Poursaeed O, Jiang T, Goshu Y, Yang H, Belongie S, Lim SN (2019) Fine-grained synthesis of unrestricted adversarial examples. arXiv:191109058"},{"key":"12007_CR37","doi-asserted-by":"crossref","unstructured":"Riba E, Mishkin D, Ponsa D, Rublee E, Bradski G (2020) Kornia: an open source differentiable computer vision library for pytorch. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp 3674\u20133683","DOI":"10.1109\/WACV45572.2020.9093363"},{"key":"12007_CR38","doi-asserted-by":"crossref","unstructured":"Shen X, Tian X, He A, Sun S, Tao D (2016) Transform-invariant convolutional neural networks for image classification and search. In: Proceedings of the 24th ACM international conference on Multimedia, pp 1345\u20131354","DOI":"10.1145\/2964284.2964316"},{"key":"12007_CR39","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv:14091556"},{"key":"12007_CR40","unstructured":"Sitawarin C, Bhagoji AN, Mosenia A, Chiang M, Mittal P (2018) Darts: Deceiving autonomous cars with toxic signs. arXiv:180206430"},{"key":"12007_CR41","unstructured":"Song Y, Shu R, Kushman N, Ermon S (2018) Constructing unrestricted adversarial examples with generative models. In: Advances in neural information processing systems, pp 8312\u20138323"},{"key":"12007_CR42","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. arXiv:13126199"},{"key":"12007_CR43","doi-asserted-by":"crossref","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2818\u20132826","DOI":"10.1109\/CVPR.2016.308"},{"key":"12007_CR44","unstructured":"Tram\u00e8r F, Kurakin A, Papernot N, Goodfellow I, Boneh D, McDaniel P (2017) Ensemble adversarial training: Attacks and defenses. arXiv:170507204"},{"key":"12007_CR45","unstructured":"Tramer F, Carlini N, Brendel W, Madry A (2020) On adaptive attacks to adversarial example defenses. arXiv:200208347"},{"key":"12007_CR46","unstructured":"Xiao C, Zhu JY, Li B, He W, Liu M, Song D (2018) Spatially transformed adversarial examples. arXiv:180102612"},{"key":"12007_CR47","unstructured":"Xiao H, Rasul K, Vollgraf R (2017) Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms. arXiv:170807747"},{"key":"12007_CR48","unstructured":"Zhao H, Le T, Montague P, De Vel O, Abraham T, Phung D (2019) Perturbations are not enough: Generating adversarial examples with spatial distortions. arXiv:191001329"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12007-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12007-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12007-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,26]],"date-time":"2022-05-26T06:40:39Z","timestamp":1653547239000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12007-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,17]]},"references-count":48,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["12007"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12007-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,17]]},"assertion":[{"value":"10 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 May 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}