{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T10:40:04Z","timestamp":1750934404575,"version":"3.41.0"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T00:00:00Z","timestamp":1749427200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T00:00:00Z","timestamp":1749427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-07480-8","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T13:00:57Z","timestamp":1749474057000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FastMS-CDA: speeding up adversarial sample generation with multistage diffusion model"],"prefix":"10.1007","volume":"81","author":[{"given":"Linying","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Shanshan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhenxiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,9]]},"reference":[{"key":"7480_CR1","doi-asserted-by":"crossref","unstructured":"Hossain T, Ma J, Li J, Zhang M (2025) Invariant shape representation learning for image classification. In: 2025 IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV). pp 4279\u20134289","DOI":"10.1109\/WACV61041.2025.00420"},{"issue":"7","key":"7480_CR2","doi-asserted-by":"publisher","first-page":"5057","DOI":"10.1007\/s00371-024-03508-x","volume":"40","author":"T Yu","year":"2024","unstructured":"Yu T, Liu Y, Liu H, Chen J, Wang X (2024) Paralkresnet: an efficient multi-scale image classification network. Vis Comput 40(7):5057\u20135066","journal-title":"Vis Comput"},{"issue":"1","key":"7480_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3691625","volume":"57","author":"B Badjie","year":"2024","unstructured":"Badjie B, Cec\u00edlio J, Casimiro A (2024) Adversarial attacks and countermeasures on image classification-based deep learning models in autonomous driving systems: A systematic review. ACM Comput Surv 57(1):1\u201352","journal-title":"ACM Comput Surv"},{"key":"7480_CR4","first-page":"1","volume":"41","author":"Y Liu","year":"2024","unstructured":"Liu Y, Zhu L, Wan L, Wang X (2024) Masked frequency-color fusion network for video instance-level hazy lane detection. Vis Comput 41:1\u201313","journal-title":"Vis Comput"},{"issue":"1","key":"7480_CR5","first-page":"13","volume":"5","author":"S Dai","year":"2024","unstructured":"Dai S, Li K, Luo Z, Zhao P, Hong B, Zhu A, Liu J (2024) Ai-based NLP section discusses the application and effect of bag-of-words models and TF-IDF in NLP tasks. J Artif Intell General Sci (JAIGS) 5(1):13\u201321","journal-title":"J Artif Intell General Sci (JAIGS)"},{"key":"7480_CR6","doi-asserted-by":"crossref","unstructured":"Zhang M, Ji S, Cai H, Dong H, Zhang P, Li Y (2024) Audio steganography based backdoor attack for speech recognition software. In: 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC). pp 1208\u20131217","DOI":"10.1109\/COMPSAC61105.2024.00161"},{"key":"7480_CR7","unstructured":"Zou A, Wang Z, Carlini N, Nasr M, Kolter JZ, Fredrikson M (2023) Universal and transferable adversarial attacks on aligned language models. arXiv preprint arXiv:2307.15043"},{"key":"7480_CR8","doi-asserted-by":"crossref","unstructured":"Ahmed SQ, Ganesh BV, Kumar SS, Mishra P, Anand R, Akurathi B (2024) A Comprehensive Review of Adversarial Attacks on Machine Learning. ArXiv arXiv:2412.11384","DOI":"10.55041\/IJSREM35239"},{"key":"7480_CR9","doi-asserted-by":"crossref","unstructured":"Akhtar N, Mian AS, Kardan N, Shah M (2021) Advances in adversarial attacks and defenses in computer vision: a survey. IEEE Access, PP 1\u20131","DOI":"10.1109\/ACCESS.2021.3127960"},{"issue":"11","key":"7480_CR10","doi-asserted-by":"publisher","first-page":"13521","DOI":"10.1007\/s10462-023-10466-8","volume":"56","author":"SF Ahmed","year":"2023","unstructured":"Ahmed SF, Alam MSB, Hassan M, Rozbu MR, Ishtiak T, Rafa N, Mofijur M, Shawkat Ali A, Gandomi AH (2023) Deep learning modelling techniques: current progress, applications, advantages, and challenges. Artif Intell Rev 56(11):13521\u201313617","journal-title":"Artif Intell Rev"},{"key":"7480_CR11","unstructured":"Madry A (2017) Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083"},{"key":"7480_CR12","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner DA (2016) Towards evaluating the robustness of neural networks. In: 2017 IEEE symposium on security and privacy (SP), 39\u201357","DOI":"10.1109\/SP.2017.49"},{"issue":"2","key":"7480_CR13","doi-asserted-by":"publisher","first-page":"634","DOI":"10.3390\/s23020634","volume":"23","author":"A Chaddad","year":"2023","unstructured":"Chaddad A, Peng J, Xu J, Bouridane A (2023) Survey of explainable Ai techniques in healthcare. Sensors 23(2):634","journal-title":"Sensors"},{"key":"7480_CR14","unstructured":"Ho J, Jain A, Abbeel P (2020) Denoising diffusion probabilistic models. In: Proceedings of the 34th International Conference on Neural Information Processing Systems. NIPS \u201920. Curran Associates Inc., Red Hook, NY, USA"},{"issue":"1","key":"7480_CR15","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1109\/COMST.2022.3233793","volume":"25","author":"K He","year":"2023","unstructured":"He K, Kim DD, Asghar MR (2023) Adversarial machine learning for network intrusion detection systems: a comprehensive survey. IEEE Commun Surv Tutor 25(1):538\u2013566","journal-title":"IEEE Commun Surv Tutor"},{"key":"7480_CR16","unstructured":"Wang F-Y, Huang Z, Bergman AW, Shen D, Gao P, Lingelbach M, Sun K, Bian W, Song G, Liu Y, et al (2024) Phased consistency model. arXiv e-prints, 2405"},{"key":"7480_CR17","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow IJ, Fergus R (2013) Intriguing properties of neural networks. CoRR abs\/1312.6199"},{"key":"7480_CR18","doi-asserted-by":"publisher","first-page":"122666","DOI":"10.1016\/j.eswa.2023.122666","volume":"241","author":"S Islam","year":"2024","unstructured":"Islam S, Elmekki H, Elsebai A, Bentahar J, Drawel N, Rjoub G, Pedrycz W (2024) A comprehensive survey on applications of transformers for deep learning tasks. Expert Syst Appl 241:122666","journal-title":"Expert Syst Appl"},{"key":"7480_CR19","doi-asserted-by":"publisher","first-page":"107539","DOI":"10.1016\/j.chb.2022.107539","volume":"139","author":"B Leichtmann","year":"2023","unstructured":"Leichtmann B, Humer C, Hinterreiter A, Streit M, Mara M (2023) Effects of explainable artificial intelligence on trust and human behavior in a high-risk decision task. Comput Hum Behav 139:107539","journal-title":"Comput Hum Behav"},{"key":"7480_CR20","first-page":"1","volume":"62","author":"S Yuan","year":"2024","unstructured":"Yuan S, Qin H, Yan X, Akhtar N, Mian A (2024) Sctransnet: Spatial-channel cross transformer network for infrared small target detection. IEEE Trans Geosci Remote Sens 62:1\u201315","journal-title":"IEEE Trans Geosci Remote Sens"},{"issue":"5","key":"7480_CR21","doi-asserted-by":"publisher","first-page":"3903","DOI":"10.1007\/s00521-022-07925-8","volume":"35","author":"I Neggaz","year":"2023","unstructured":"Neggaz I, Neggaz N, Fizazi H (2023) Boosting archimedes optimization algorithm using trigonometric operators based on feature selection for facial analysis. Neural Comput Appl 35(5):3903\u20133923","journal-title":"Neural Comput Appl"},{"key":"7480_CR22","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. In: Bengio, Y., LeCun, Y. (eds.) 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9 2015, Conference Track Proceedings"},{"key":"7480_CR23","unstructured":"Tram\u00e8r F, Kurakin A, Papernot N, Goodfellow I, Boneh D, McDaniel P (2018) Ensemble adversarial training: attacks and defenses. In: International Conference on Learning Representations"},{"key":"7480_CR24","doi-asserted-by":"publisher","first-page":"7","DOI":"10.52711\/2321-581X.2023.00002","volume":"14","author":"P Kumar","year":"2023","unstructured":"Dong Y, Liao F, Pang T, Su H, Zhu J, Hu X, Li J (2017) Boosting adversarial attacks with momentum. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 9185\u20139193","journal-title":"Res J Eng Technol"},{"key":"7480_CR25","first-page":"2894","volume":"36","author":"H Xue","year":"2023","unstructured":"Xue H, Araujo A, Hu B, Chen Y (2023) Diffusion-based adversarial sample generation for improved stealthiness and controllability. Adv Neural Inf Process Syst 36:2894\u20132921","journal-title":"Adv Neural Inf Process Syst"},{"issue":"3","key":"7480_CR26","first-page":"1216","volume":"5","author":"S Aggarwal","year":"2024","unstructured":"Aggarwal S, Mittal A, Aggarwal S, Singh AK (2024) Dynamic programming-based white box adversarial attack for deep neural networks. AImer 5(3):1216\u20131234","journal-title":"AImer"},{"key":"7480_CR27","doi-asserted-by":"publisher","first-page":"86541","DOI":"10.1109\/ACCESS.2024.3415356","volume":"12","author":"M Yoshida","year":"2024","unstructured":"Yoshida M, Namura H, Okuda M (2024) Adversarial examples for image cropping: Gradient-based and Bayesian-optimized approaches for effective adversarial attack. IEEE Access 12:86541\u201386552","journal-title":"IEEE Access"},{"issue":"29","key":"7480_CR28","doi-asserted-by":"publisher","first-page":"72279","DOI":"10.1007\/s11042-024-18475-7","volume":"83","author":"ML Naseem","year":"2024","unstructured":"Naseem ML (2024) Trans-IFFT-FGSM: a novel fast gradient sign method for adversarial attacks. Multimed Tools Appl 83(29):72279\u201372299","journal-title":"Multimed Tools Appl"},{"key":"7480_CR29","doi-asserted-by":"crossref","unstructured":"Hu C, Chen L, Li S, Yi Y, Zhan Y, Liu J, Shi H, Shi R (2025) Cross-gen: An efficient generator network for adversarial attack of cross-modal hashing retrieval. Available at SSRN 5192172","DOI":"10.2139\/ssrn.5192172"},{"key":"7480_CR30","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/s40747-024-01748-x","volume":"11","author":"J Hu","year":"2025","unstructured":"Hu J, Li X, Liu C, Zhang R, Tang J, Sun Y, Wang Y (2025) Apdl: an adaptive step size method for white-box adversarial attacks. Complex Intell Syst 11:116","journal-title":"Complex Intell Syst"},{"key":"7480_CR31","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli S-M, Fawzi A, Frossard P (2016) Deepfool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2574\u20132582","DOI":"10.1109\/CVPR.2016.282"},{"key":"7480_CR32","unstructured":"Croce F, Hein M (2020) Minimally distorted adversarial examples with a fast adaptive boundary attack. In: International Conference on Machine Learning, pp. 2196\u20132205"},{"key":"7480_CR33","first-page":"901","volume":"238","author":"Z Guo","year":"2024","unstructured":"Guo Z, Li W, Qian Y, Arandjelovic O, Fang L (2024) A white-box false positive adversarial attack method on contrastive loss based offline handwritten signature verification models. Proc 27th Int Conf Artif Intell Stat 238:901\u2013909","journal-title":"Proc 27th Int Conf Artif Intell Stat"},{"key":"7480_CR34","first-page":"93","volume-title":"Eur Conf Comput Vis","author":"X Dai","year":"2025","unstructured":"Dai X, Liang K, Xiao B (2025) Advdiff: Generating unrestricted adversarial examples using diffusion models. Eur Conf Comput Vis. Springer, Cham, pp 93\u2013109"},{"key":"7480_CR35","doi-asserted-by":"crossref","unstructured":"Li J, Yu Z, He Z, Wang ZJ, Kang X (2025) Pgd-imp: Rethinking and unleashing potential of classic PGD with dual strategies for imperceptible adversarial attacks. In: ICASSP 2025\u20142025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). pp 1\u20135","DOI":"10.1109\/ICASSP49660.2025.10890043"},{"issue":"7","key":"7480_CR36","doi-asserted-by":"publisher","first-page":"1274","DOI":"10.3390\/electronics14071274","volume":"14","author":"R Zhang","year":"2025","unstructured":"Zhang R, Wu Q, Wang Y (2025) An adversarial example generation algorithm based on de-c &w. Electronics 14(7):1274","journal-title":"Electronics"},{"key":"7480_CR37","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli S-M, Fawzi A, Fawzi O, Frossard P (2017) Universal adversarial perturbations. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition pp 1765\u20131773","DOI":"10.1109\/CVPR.2017.17"},{"key":"7480_CR38","unstructured":"Ducoffe M, Precioso F (2018) Adversarial active learning for deep networks: a margin based approach. arXiv preprint arXiv:1802.09841"},{"key":"7480_CR39","first-page":"721","volume":"51","author":"SX Liu","year":"2022","unstructured":"Liu SX, Jiang H, Jing F (2022) Adversarial examplesgeneration algorithm based on decision boundary search. J Univ Electr Sci Technol China 51:721\u2013727","journal-title":"J Univ Electr Sci Technol China"},{"key":"7480_CR40","unstructured":"Li Z, Du X, Lei N, Chen L, Wang W (2025) Nopain: No-box point cloud attack via optimal transport singular boundary. arXiv preprint arXiv:2503.00063"},{"issue":"13","key":"7480_CR41","doi-asserted-by":"publisher","first-page":"2446","DOI":"10.3390\/electronics13132446","volume":"13","author":"J Gao","year":"2024","unstructured":"Gao J, Zheng K, Wang X, Wu C, Wu B (2024) Efsattack: Edge noise-constrained black-box attack using artificial fish swarm algorithm. Electronics 13(13):2446","journal-title":"Electronics"},{"key":"7480_CR42","doi-asserted-by":"publisher","first-page":"80770","DOI":"10.1109\/ACCESS.2024.3407097","volume":"12","author":"G Yu","year":"2024","unstructured":"Yu G, Jeon M, Hwang H (2024) D-badge: Decision-based adversarial batch attack with directional gradient estimation. IEEE Access 12:80770\u201380780","journal-title":"IEEE Access"},{"issue":"7","key":"7480_CR43","first-page":"7628","volume":"39","author":"F Wang","year":"2025","unstructured":"Wang F, Zuo X, Huang H, Chen G (2025) Adba: Approximation decision boundary approach for black-box adversarial attacks. Proc AAAI Conf Artif Intell 39(7):7628\u20137636","journal-title":"Proc AAAI Conf Artif Intell"},{"issue":"11","key":"7480_CR44","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278\u20132324","journal-title":"Proc IEEE"},{"key":"7480_CR45","unstructured":"Krizhevsky A, Hinton G, et al (2009) Learning multiple layers of features from tiny images"},{"key":"7480_CR46","unstructured":"Netzer Y, Wang T, Coates A, Bissacco A, Wu B, Ng AY (2011) Reading digits in natural images with unsupervised feature learning. In: NIPS Workshop on Deep Learning and Unsupervised Feature Learning 2011"},{"key":"7480_CR47","doi-asserted-by":"crossref","unstructured":"Deng J, Dong W, Socher R, Li L-J, Li K, Fei-Fei L (2009) Imagenet: A large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248\u2013255","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"7480_CR48","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (sp). pp 39\u201357","DOI":"10.1109\/SP.2017.49"},{"issue":"11","key":"7480_CR49","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278\u20132324","journal-title":"Proc IEEE"},{"key":"7480_CR50","doi-asserted-by":"crossref","unstructured":"Sandler M, Howard A, Zhu M, Zhmoginov A, Chen L-C (2018) Mobilenetv2: Inverted residuals and linear bottlenecks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. pp 4510\u20134520","DOI":"10.1109\/CVPR.2018.00474"},{"key":"7480_CR51","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"issue":"2","key":"7480_CR52","first-page":"180","volume":"50","author":"S Liu","year":"2024","unstructured":"Liu S, Li Z, Wang G, Zhang L (2024) Adversarial example generation algorithm based on transformer and GAN. Comput Eng 50(2):180\u2013187","journal-title":"Comput Eng"},{"key":"7480_CR53","doi-asserted-by":"crossref","unstructured":"Hicks JR (1935) Marktform und gleichgewicht","DOI":"10.2307\/2224643"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07480-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-07480-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07480-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T10:04:18Z","timestamp":1750932258000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-07480-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,9]]},"references-count":53,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["7480"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-07480-8","relation":{},"ISSN":["1573-0484"],"issn-type":[{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2025,6,9]]},"assertion":[{"value":"18 May 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2025","order":3,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":4,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Reference 8 and 9 where incorrect and are now corrected.","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"995"}}