{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:16:09Z","timestamp":1757628969645,"version":"3.44.0"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"29","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Sichuan Science and Technology Program","award":["2021YFH0076"],"award-info":[{"award-number":["2021YFH0076"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-022-14067-5","type":"journal-article","created":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:02:41Z","timestamp":1666742561000},"page":"35137-35149","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Adversarial attack algorithm for traffic sign recognition"],"prefix":"10.1007","volume":"84","author":[{"given":"Juan","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3787-8103","authenticated-orcid":false,"given":"Lei","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Haoxi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Edward","family":"Szczerbicki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"issue":"6","key":"14067_CR1","doi-asserted-by":"publisher","first-page":"2119","DOI":"10.1109\/TPAMI.2020.3031625","volume":"43","author":"S Bai","year":"2021","unstructured":"Bai S, Li Y, Zhou Y, Li Q, Torr PHS (2021) Adversarial metric attack and defense for person re-identification. IEEE Trans Pattern Anal Mach Intell 43 (6):2119\u20132126. https:\/\/doi.org\/10.1109\/TPAMI.2020.3031625","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"14067_CR2","doi-asserted-by":"publisher","first-page":"51548","DOI":"10.1109\/ACCESS.2022.3174963","volume":"10","author":"K Cai","year":"2022","unstructured":"Cai K, Zhu X, Hu Z-L (2022) Black-box reward attacks against deep reinforcement learning based on successor representation. IEEE Access 10:51548\u201351560. https:\/\/doi.org\/10.1109\/ACCESS.2022.3174963","journal-title":"IEEE Access"},{"key":"14067_CR3","doi-asserted-by":"publisher","first-page":"1769","DOI":"10.1109\/LSP.2021.3106239","volume":"28","author":"M Esmaeilpour","year":"2021","unstructured":"Esmaeilpour M, Cardinal P, Koerich AL (2021) Cyclic defense gan against speech adversarial attacks. IEEE Signal Process Lett 28:1769\u20131773. https:\/\/doi.org\/10.1109\/LSP.2021.3106239","journal-title":"IEEE Signal Process Lett"},{"key":"14067_CR4","doi-asserted-by":"publisher","first-page":"2044","DOI":"10.1109\/TIFS.2022.3175603","volume":"17","author":"M Esmaeilpour","year":"2022","unstructured":"Esmaeilpour M, Cardinal P, Koerich AL (2022) Multidiscriminator sobolev defense-gan against adversarial attacks for end-to-end speech systems. IEEE Trans Inf Forensics and Secur 17:2044\u20132058. https:\/\/doi.org\/10.1109\/TIFS.2022.3175603","journal-title":"IEEE Trans Inf Forensics and Secur"},{"key":"14067_CR5","unstructured":"Guo C, Gardner J, You Y, Wilson AG, Weinberger K (2019) Simple black-box adversarial attacks. In: International conference on machine learning, PMLR, pp 2484\u20132493"},{"key":"14067_CR6","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/ACCESS.2021.3124050","volume":"9","author":"H Heo","year":"2021","unstructured":"Heo H, Ko D, Lee J, Hong Y, Kim HJ (2021) Search-and-attack: temporally sparse adversarial perturbations on videos. IEEE Access 9:38\u2013146947. https:\/\/doi.org\/10.1109\/ACCESS.2021.3124050","journal-title":"IEEE Access"},{"issue":"5","key":"14067_CR7","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1109\/TCSII.2020.2980022","volume":"67","author":"Y Kim","year":"2020","unstructured":"Kim Y, Han D, Kim C, Yoo HJ (2020) A 0 22\u20130.89 mw low-power and highly-secure always-on face recognition processor with adversarial attack prevention. IEEE Trans Circ Syst II Express Briefs 67(5):846\u2013850. https:\/\/doi.org\/10.1109\/TCSII.2020.2980022","journal-title":"IEEE Trans Circ Syst II Express Briefs"},{"key":"14067_CR8","doi-asserted-by":"publisher","first-page":"6156","DOI":"10.1109\/TIP.2021.3092822","volume":"30","author":"N Li","year":"2021","unstructured":"Li N, Chen Z (2021) Toward visual distortion in black-box attacks. IEEE Trans Image Process 30:6156\u20136167. https:\/\/doi.org\/10.1109\/TIP.2021.3092822","journal-title":"IEEE Trans Image Process"},{"key":"14067_CR9","doi-asserted-by":"publisher","first-page":"962","DOI":"10.1109\/TIP.2021.3137648","volume":"31","author":"S-Y Lo","year":"2022","unstructured":"Lo S-Y, Patel VM (2022) Defending against multiple and unforeseen adversarial videos. IEEE Trans Image Process 31:962\u2013973. https:\/\/doi.org\/10.1109\/TIP.2021.3137648","journal-title":"IEEE Trans Image Process"},{"issue":"21693536","key":"14067_CR10","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1109\/ACCESS.2021.3138338","volume":"10","author":"K Mahmood","year":"2022","unstructured":"Mahmood K, Mahmood R, Rathbun E, Van Dijk M (2022) Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks. IEEE Access 10(21693536):998\u20131019. https:\/\/doi.org\/10.1109\/ACCESS.2021.3138338","journal-title":"IEEE Access"},{"key":"14067_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LGRS.2022.3184311","volume":"19","author":"B Peng","year":"2022","unstructured":"Peng B, Peng B, Zhou J, Xia J, Liu L (2022) Speckle-variant attack: toward transferable adversarial attack to sar target recognition. IEEE Geosci Remote Sens Lett 19:1\u20135. https:\/\/doi.org\/10.1109\/LGRS.2022.3184311","journal-title":"IEEE Geosci Remote Sens Lett"},{"issue":"2","key":"14067_CR12","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1109\/TR.2022.3161138","volume":"71","author":"P Qi","year":"2022","unstructured":"Qi P, Jiang T, Wang L, Yuan X, Li Z (2022) Detection tolerant black-box adversarial attack against automatic modulation classification with deep learning. IEEE Trans Reliab 71(2):674\u2013686. https:\/\/doi.org\/10.1109\/TR.2022.3161138","journal-title":"IEEE Trans Reliab"},{"key":"14067_CR13","unstructured":"Song D, Eykholt K, Evtimov I, Fernandes E, Li B, Rahmati A, Tramer F, Prakash A, Kohno T (2018) Physical adversarial examples for object detectors. In: 12Th USENIX workshop on offensive technologies (WOOT 18)"},{"key":"14067_CR14","doi-asserted-by":"publisher","first-page":"92735","DOI":"10.1109\/ACCESS.2021.3092646","volume":"9","author":"F Vakhshiteh","year":"2021","unstructured":"Vakhshiteh F, Nickabadi A, Ramachandra R (2021) Adversarial attacks against face recognition: a comprehensive study. IEEE Access 9:92735\u201392756. https:\/\/doi.org\/10.1109\/ACCESS.2021.3092646","journal-title":"IEEE Access"},{"key":"14067_CR15","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/ACCESS.2020.3024149","volume":"8","author":"Y Zheng","year":"2020","unstructured":"Zheng Y, Lu Y, Velipasalar S (2020) An effective adversarial attack on person re-identification in video surveillance via dispersion reduction. IEEE Access 8:91\u2013183902. https:\/\/doi.org\/10.1109\/ACCESS.2020.3024149","journal-title":"IEEE Access"},{"key":"14067_CR16","doi-asserted-by":"publisher","first-page":"1452","DOI":"10.1109\/TIFS.2020.3036801","volume":"16","author":"Y Zhong","year":"2021","unstructured":"Zhong Y, Deng W (2021) Towards transferable adversarial attack against deep face recognition. IEEE Trans Inf Forensic Secur 16:1452\u20131466. https:\/\/doi.org\/10.1109\/TIFS.2020.3036801","journal-title":"IEEE Trans Inf Forensic Secur"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14067-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-14067-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14067-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T11:28:28Z","timestamp":1757503708000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-14067-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":16,"journal-issue":{"issue":"29","published-online":{"date-parts":[[2025,9]]}},"alternative-id":["14067"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-14067-5","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,10,26]]},"assertion":[{"value":"11 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}