{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T11:04:10Z","timestamp":1761649450574,"version":"3.33.0"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T00:00:00Z","timestamp":1738022400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T00:00:00Z","timestamp":1738022400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s11704-024-40533-4","type":"journal-article","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T14:09:01Z","timestamp":1738073341000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Common knowledge learning for generating transferable adversarial examples"],"prefix":"10.1007","volume":"19","author":[{"given":"Ruijie","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yuanfang","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Junfu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiantao","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yunhong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,28]]},"reference":[{"key":"40533_CR1","first-page":"1097","volume-title":"Proceedings of the 25th International Conference on Neural Information Processing Systems","author":"A Krizhevsky","year":"2012","unstructured":"Krizhevsky A, Sutskever I, Hinton G E. ImageNet classification with deep convolutional neural networks. In: Proceedings of the 25th International Conference on Neural Information Processing Systems. 2012, 1097\u20131105"},{"key":"40533_CR2","first-page":"1","volume-title":"Proceedings of the 3rd International Conference on Learning Representations","author":"K Simonyan","year":"2015","unstructured":"Simonyan K, Zisserman A. Very deep convolutional networks for large-scale image recognition. In: Proceedings of the 3rd International Conference on Learning Representations. 2015, 1\u201314"},{"key":"40533_CR3","first-page":"770","volume-title":"Proceedings of 2016 IEEE Conference on Computer Vision and Pattern Recognition","author":"K He","year":"2016","unstructured":"He K, Zhang X, Ren S, Sun J. Deep residual learning for image recognition. In: Proceedings of 2016 IEEE Conference on Computer Vision and Pattern Recognition. 2016, 770\u2013778"},{"key":"40533_CR4","first-page":"1","volume-title":"Proceedings of the 9th International Conference on Learning Representations","author":"A Dosovitskiy","year":"2021","unstructured":"Dosovitskiy A, Beyer L, Kolesnikov A, Weissenborn D, Zhai X, Unterthiner T, Dehghani M, Minderer M, Heigold G, Gelly S, Uszkoreit J, Houlsby N. An image is worth 16x16 words: transformers for image recognition at scale. In: Proceedings of the 9th International Conference on Learning Representations. 2021, 1\u201321"},{"key":"40533_CR5","first-page":"9992","volume-title":"Proceedings of 2021 IEEE\/CVF International Conference on Computer Vision","author":"Z Liu","year":"2021","unstructured":"Liu Z, Lin Y, Cao Y, Hu H, Wei Y, Zhang Z, Lin S, Guo B. Swin transformer: hierarchical vision transformer using shifted windows. In: Proceedings of 2021 IEEE\/CVF International Conference on Computer Vision. 2021, 9992\u201310002"},{"issue":"5","key":"40533_CR6","doi-asserted-by":"publisher","first-page":"155320","DOI":"10.1007\/s11704-020-9294-7","volume":"15","author":"Y P Sun","year":"2021","unstructured":"Sun Y P, Zhang M L. Compositional metric learning for multi-label classification. Frontiers of Computer Science, 2021, 15(5): 155320","journal-title":"Frontiers of Computer Science"},{"issue":"11","key":"40533_CR7","doi-asserted-by":"publisher","first-page":"6275","DOI":"10.1109\/TNNLS.2021.3073248","volume":"33","author":"F Ma","year":"2022","unstructured":"Ma F, Wu Y, Yu X, Yang Y. Learning with noisy labels via self-reweighting from class centroids. IEEE Transactions on Neural Networks and Learning Systems, 2022, 33(11): 6275\u20136285","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"1","key":"40533_CR8","doi-asserted-by":"publisher","first-page":"181335","DOI":"10.1007\/s11704-023-3186-6","volume":"18","author":"Y Yang","year":"2024","unstructured":"Yang Y, Guo J, Li G, Li L, Li W, Yang J. Alignment efficient image-sentence retrieval considering transferable cross-modal representation learning. Frontiers of Computer Science, 2024, 18(1): 181335","journal-title":"Frontiers of Computer Science"},{"issue":"1","key":"40533_CR9","doi-asserted-by":"publisher","first-page":"181304","DOI":"10.1007\/s11704-022-2385-x","volume":"18","author":"T Hu","year":"2024","unstructured":"Hu T, Long C, Xiao C. CRD-CGAN: category-consistent and relativistic constraints for diverse text-to-image generation. Frontiers of Computer Science, 2024, 18(1): 181304","journal-title":"Frontiers of Computer Science"},{"issue":"1","key":"40533_CR10","doi-asserted-by":"publisher","first-page":"191303","DOI":"10.1007\/s11704-023-3396-y","volume":"19","author":"X Liang","year":"2025","unstructured":"Liang X, Qian Y, Guo Q, Zheng K. A data representation method using distance correlation. Frontiers of Computer Science, 2025, 19(1): 191303","journal-title":"Frontiers of Computer Science"},{"key":"40533_CR11","first-page":"1","volume-title":"Proceedings of the 3rd International Conference on Learning Representations","author":"I J Goodfellow","year":"2015","unstructured":"Goodfellow I J, Shlens J, Szegedy C. Explaining and harnessing adversarial examples. In: Proceedings of the 3rd International Conference on Learning Representations. 2015, 1\u201311"},{"key":"40533_CR12","first-page":"1","volume-title":"Proceedings of the 8th International Conference on Learning Representations","author":"J Lin","year":"2020","unstructured":"Lin J, Song C, He K, Wang L, Hopcroft J E. Nesterov accelerated gradient and scale invariance for adversarial attacks. In: Proceedings of the 8th International Conference on Learning Representations. 2020, 1\u201312"},{"key":"40533_CR13","volume-title":"Autonomous LLM-enhanced adversarial attack for text-to-motion","author":"H Miao","year":"2024","unstructured":"Miao H, Ma F, Quan R, Zhan K, Yang Y. Autonomous LLM-enhanced adversarial attack for text-to-motion. 2024, arXiv preprint arXiv: 2408.00352"},{"key":"40533_CR14","doi-asserted-by":"publisher","first-page":"9185","DOI":"10.1109\/CVPR.2018.00957","volume-title":"Proceedings of 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Y Dong","year":"2018","unstructured":"Dong Y, Liao F, Pang T, Su H, Zhu J, Hu X, Li J. Boosting adversarial attacks with momentum. In: Proceedings of 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2018, 9185\u20139193"},{"issue":"4","key":"40533_CR15","doi-asserted-by":"publisher","first-page":"184318","DOI":"10.1007\/s11704-023-2639-2","volume":"18","author":"Y Yang","year":"2024","unstructured":"Yang Y, Huang P, Cao J, Li J, Lin Y, Ma F. A prompt-based approach to adversarial example generation and robustness enhancement. Frontiers of Computer Science, 2024, 18(4): 184318","journal-title":"Frontiers of Computer Science"},{"issue":"2","key":"40533_CR16","doi-asserted-by":"publisher","first-page":"182307","DOI":"10.1007\/s11704-023-2283-x","volume":"18","author":"S Lu","year":"2024","unstructured":"Lu S, Li R, Liu W. FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack. Frontiers of Computer Science, 2024, 18(2): 182307","journal-title":"Frontiers of Computer Science"},{"key":"40533_CR17","first-page":"3662","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","author":"J Zou","year":"2022","unstructured":"Zou J, Duan Y, Li B, Zhang W, Pan Y, Pan Z. Making adversarial examples more transferable and indistinguishable. In: Proceedings of the AAAI Conference on Artificial Intelligence. 2022, 3662\u20133670"},{"key":"40533_CR18","first-page":"2725","volume-title":"Proceedings of 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"C Xie","year":"2019","unstructured":"Xie C, Zhang Z, Zhou Y, Bai S, Wang J, Ren Z, Yuille A L. Improving transferability of adversarial examples with input diversity. In: Proceedings of 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2019, 2725\u20132734"},{"key":"40533_CR19","first-page":"4307","volume-title":"Proceedings of 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Y Dong","year":"2019","unstructured":"Dong Y, Pang T, Su H, Zhu J. Evading defenses to transferable adversarial examples by translation-invariant attacks. In: Proceedings of 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2019, 4307\u20134316"},{"key":"40533_CR20","first-page":"16138","volume-title":"Proceedings of 2021 IEEE\/CVF International Conference on Computer Vision","author":"X Wang","year":"2021","unstructured":"Wang X, He X, Wang J, He K. Admix: enhancing the transferability of adversarial attacks. In: Proceedings of 2021 IEEE\/CVF International Conference on Computer Vision. 2021, 16138\u201316147"},{"key":"40533_CR21","first-page":"9020","volume-title":"Proceedings of 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"W Wu","year":"2021","unstructured":"Wu W, Su Y, Lyu M R, King I. Improving the transferability of adversarial samples with adversarial transformations. In: Proceedings of 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2021, 9020\u20139029"},{"key":"40533_CR22","first-page":"7818","volume-title":"Proceedings of 2021 IEEE\/CVF International Conference on Computer Vision","author":"K Mahmood","year":"2021","unstructured":"Mahmood K, Mahmood R, van Dijk M. On the robustness of vision transformers to adversarial examples. In: Proceedings of 2021 IEEE\/CVF International Conference on Computer Vision. 2021, 7818\u20137827"},{"key":"40533_CR23","first-page":"1","volume-title":"Proceedings of the 10th International Conference on Learning Representations","author":"M Naseer","year":"2022","unstructured":"Naseer M, Ranasinghe K, Khan S, Khan F S, Porikli F. On improving adversarial transferability of vision transformers. In: Proceedings of the 10th International Conference on Learning Representations. 2022, 1\u201324"},{"key":"40533_CR24","first-page":"2668","volume-title":"Proceedings of the 36th AAAI Conference on Artificial Intelligence","author":"Z Wei","year":"2022","unstructured":"Wei Z, Chen J, Goldblum M, Wu Z, Goldstein T, Jiang Y G. Towards transferable adversarial attacks on vision transformers. In: Proceedings of the 36th AAAI Conference on Artificial Intelligence. 2022, 2668\u20132676"},{"key":"40533_CR25","first-page":"1360","volume-title":"Proceedings of 2023 IEEE\/CVF Winter Conference on Applications of Computer Vision","author":"F Waseda","year":"2023","unstructured":"Waseda F, Nishikawa S, Le T N, Nguyen H H, Echizen I. Closer look at the transferability of adversarial examples: how they fool different models differently. In: Proceedings of 2023 IEEE\/CVF Winter Conference on Applications of Computer Vision. 2023, 1360\u20131368"},{"key":"40533_CR26","first-page":"489","volume-title":"Proceedings of the 34th International Conference on Neural Information Processing Systems","author":"T Yu","year":"2020","unstructured":"Yu T, Kumar S, Gupta A, Levine S, Hausman K, Finn C. Gradient surgery for multi-task learning. In: Proceedings of the 34th International Conference on Neural Information Processing Systems. 2020, 489"},{"key":"40533_CR27","first-page":"1","volume-title":"Proceedings of the 2nd International Conference on Learning Representations","author":"J Bruna","year":"2014","unstructured":"Bruna J, Szegedy C, Sutskever I, Goodfellow I, Zaremba W, Fergus R, Erhan D. Intriguing properties of neural networks. In: Proceedings of the 2nd International Conference on Learning Representations. 2014, 1\u201310"},{"key":"40533_CR28","first-page":"318","volume-title":"Proceedings of 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Y Dong","year":"2020","unstructured":"Dong Y, Fu Q A, Yang X, Pang T, Su H, Xiao Z, Zhu J. Benchmarking adversarial robustness on image classification. In: Proceedings of 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2020, 318\u2013328"},{"key":"40533_CR29","first-page":"3866","volume-title":"Proceedings of the 36th International Conference on Machine Learning","author":"Y Li","year":"2019","unstructured":"Li Y, Li L, Wang L, Zhang T, Gong B. NATTACK: learning the distributions of adversarial examples for an improved black-box attack on deep neural networks. In: Proceedings of the 36th International Conference on Machine Learning. 2019, 3866\u20133876"},{"key":"40533_CR30","first-page":"1","volume-title":"Proceedings of the 7th International Conference on Learning Representations","author":"M Cheng","year":"2019","unstructured":"Cheng M, Le T, Chen P Y, Zhang H, Yi J, Hsieh C J. Query-efficient hard-label black-box attack: an optimization-based approach. In: Proceedings of the 7th International Conference on Learning Representations. 2019, 1\u201314"},{"key":"40533_CR31","first-page":"1027","volume-title":"Proceedings of 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Y Shi","year":"2020","unstructured":"Shi Y, Han Y, Tian Q. Polishing decision-based adversarial noise with a customized sampling. In: Proceedings of 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2020, 1027\u20131035"},{"key":"40533_CR32","first-page":"15233","volume-title":"Proceedings of 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"L Zhou","year":"2022","unstructured":"Zhou L, Cui P, Zhang X, Jiang Y, Yang S. Adversarial Eigen attack on BlackBox models. In: Proceedings of 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2022, 15233\u201315241"},{"key":"40533_CR33","first-page":"1","volume-title":"Proceedings of the 10th International Conference on Learning Representations","author":"N A Lord","year":"2022","unstructured":"Lord N A, Mueller R, Bertinetto L. Attacking deep networks with surrogate-based adversarial black-box methods is easy. In: Proceedings of the 10th International Conference on Learning Representations. 2022, 1\u201317"},{"key":"40533_CR34","first-page":"4732","volume-title":"Proceedings of 2019 IEEE\/CVF International Conference on Computer Vision","author":"Q Huang","year":"2019","unstructured":"Huang Q, Katsman I, Gu Z, He H, Belongie S J, Lim S N. Enhancing adversarial example transferability with an intermediate level attack. In: Proceedings of 2019 IEEE\/CVF International Conference on Computer Vision. 2019, 4732\u20134741"},{"key":"40533_CR35","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/3475724.3483608","volume-title":"Proceedings of the 1st International Workshop on Adversarial Learning for Multimedia","author":"D Yang","year":"2021","unstructured":"Yang D, Li W, Ni R, Zhao Y. Enhancing adversarial examples transferability via ensemble feature manifolds. In: Proceedings of the 1st International Workshop on Adversarial Learning for Multimedia. 2021, 49\u201354"},{"issue":"5","key":"40533_CR36","doi-asserted-by":"publisher","first-page":"165325","DOI":"10.1007\/s11704-021-0198-y","volume":"16","author":"F Gumus","year":"2022","unstructured":"Gumus F, Amasyali M F. Exploiting natural language services: a polarity based black-box attack. Frontiers of Computer Science, 2022, 16(5): 165325","journal-title":"Frontiers of Computer Science"},{"issue":"2","key":"40533_CR37","doi-asserted-by":"publisher","first-page":"2332","DOI":"10.1007\/s10489-022-03469-5","volume":"53","author":"B Yang","year":"2023","unstructured":"Yang B, Zhang H, Li Z, Zhang Y, Xu K, Wang J. Adversarial example generation with adabelief optimizer and crop invariance. Applied Intelligence, 2023, 53(2): 2332\u20132347","journal-title":"Applied Intelligence"},{"key":"40533_CR38","first-page":"1924","volume-title":"Proceedings of 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"X Wang","year":"2021","unstructured":"Wang X, He K. Enhancing the transferability of adversarial attacks through variance tuning. In: Proceedings of 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2021, 1924\u20131933"},{"key":"40533_CR39","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1109\/TMM.2021.3124083","volume":"25","author":"H Yuan","year":"2023","unstructured":"Yuan H, Chu Q, Zhu F, Zhao R, Liu B, Yu N. AutoMA: towards automatic model augmentation for transferable adversarial attacks. IEEE Transactions on Multimedia, 2023, 25: 203\u2013213","journal-title":"IEEE Transactions on Multimedia"},{"key":"40533_CR40","first-page":"24261","volume-title":"Proceedings of the 35th International Conference on Neural Information Processing Systems","author":"I O Tolstikhin","year":"2021","unstructured":"Tolstikhin I O, Houlsby N, Kolesnikov A, Beyer L, Zhai X, Unterthiner T, Yung J, Steiner A, Keysers D, Uszkoreit J, Lucic M, Dosovitskiy A. MLP-mixer: an all-MLP architecture for vision. In: Proceedings of the 35th International Conference on Neural Information Processing Systems. 2021, 24261\u201324272"},{"issue":"6","key":"40533_CR41","doi-asserted-by":"publisher","first-page":"1789","DOI":"10.1007\/s11263-021-01453-z","volume":"129","author":"J Gou","year":"2021","unstructured":"Gou J, Yu B, Maybank S J, Tao D. Knowledge distillation: a survey. International Journal of Computer Vision, 2021, 129(6): 1789\u20131819","journal-title":"International Journal of Computer Vision"},{"key":"40533_CR42","first-page":"13657","volume-title":"Proceedings of the 35th AAAI Conference on Artificial Intelligence","author":"P Passban","year":"2021","unstructured":"Passban P, Wu Y, Rezagholizadeh M, Liu Q. ALP-KD: attention-based layer projection for knowledge distillation. In: Proceedings of the 35th AAAI Conference on Artificial Intelligence. 2021, 13657\u201313665"},{"key":"40533_CR43","first-page":"7028","volume-title":"Proceedings of the 35th AAAI Conference on Artificial Intelligence","author":"D Chen","year":"2021","unstructured":"Chen D, Mei J P, Zhang Y, Wang C, Wang Z, Feng Y, Chen C. Cross-layer distillation with semantic calibration. In: Proceedings of the 35th AAAI Conference on Artificial Intelligence. 2021, 7028\u20137036"},{"key":"40533_CR44","first-page":"141","volume-title":"Proceedings of the 30th British Machine Vision Conference","author":"S Lee","year":"2019","unstructured":"Lee S, Song B C. Graph-based knowledge distillation by multi-head attention network. In: Proceedings of the 30th British Machine Vision Conference. 2019, 141"},{"key":"40533_CR45","volume-title":"Distilling the knowledge in a neural network","author":"G Hinton","year":"2015","unstructured":"Hinton G, Vinyals O, Dean J. Distilling the knowledge in a neural network. 2015, arXiv preprint arXiv: 1503.02531"},{"key":"40533_CR46","first-page":"1443","volume-title":"Proceedings of the 35th International Conference on Neural Information Processing Systems","author":"B Liu","year":"2021","unstructured":"Liu B, Liu X, Jin X, Stone P, Liu Q. Conflict-averse gradient descent for multi-task learning. In: Proceedings of the 35th International Conference on Neural Information Processing Systems. 2021, 1443"},{"key":"40533_CR47","volume-title":"University of Toronto, Dissertation","author":"A Krizhevsky","year":"2009","unstructured":"Krizhevsky A. Learning multiple layers of features from tiny images. University of Toronto, Dissertation, 2009"},{"key":"40533_CR48","first-page":"2261","volume-title":"Proceedings of 2017 IEEE Conference on Computer Vision and Pattern Recognition","author":"G Huang","year":"2017","unstructured":"Huang G, Liu Z, Van Der Maaten L, Weinberger K Q. Densely connected convolutional networks. In: Proceedings of 2017 IEEE Conference on Computer Vision and Pattern Recognition. 2017, 2261\u20132269"},{"key":"40533_CR49","first-page":"2818","volume-title":"Proceedings of 2016 IEEE Conference on Computer Vision and Pattern Recognition","author":"C Szegedy","year":"2016","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z. Rethinking the inception architecture for computer vision. In: Proceedings of 2016 IEEE Conference on Computer Vision and Pattern Recognition. 2016, 2818\u20132826"},{"key":"40533_CR50","doi-asserted-by":"publisher","first-page":"4510","DOI":"10.1109\/CVPR.2018.00474","volume-title":"Proceedings of 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"M Sandler","year":"2018","unstructured":"Sandler M, Howard A G, Zhu M, Zhmoginov A, Chen L C. MobileNetV2: inverted residuals and linear bottlenecks. In: Proceedings of 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2018, 4510\u20134520"},{"key":"40533_CR51","first-page":"3603","volume-title":"Proceedings of the ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing","author":"D Ng","year":"2022","unstructured":"Ng D, Chen Y, Tian B, Fu Q, Chng E S. Convmixer: feature interactive convolution with curriculum learning for small footprint and noisy far-field keyword spotting. In: Proceedings of the ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing. 2022, 3603\u20133607"},{"key":"40533_CR52","first-page":"1","volume-title":"Proceedings of the 11th International Conference on Learning Representations","author":"C W Yan","year":"2023","unstructured":"Yan C W, Cheung T H, Yeung D Y. ILA-DA: improving transferability of intermediate level attack with data augmentation. In: Proceedings of the 11th International Conference on Learning Representations. 2023, 1\u201325"},{"key":"40533_CR53","first-page":"468","volume-title":"Proceedings of the 35th International Conference on Neural Information Processing Systems","author":"Z Zhao","year":"2021","unstructured":"Zhao Z, Liu Z, Larson M A. On success and simplicity: a second look at transferable targeted attacks. In: Proceedings of the 35th International Conference on Neural Information Processing Systems. 2021, 468"},{"issue":"2","key":"40533_CR54","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/s11263-019-01228-7","volume":"128","author":"R R Selvaraju","year":"2020","unstructured":"Selvaraju R R, Cogswell M, Das A, Vedantam R, Parikh D, Batra D. Grad-CAM: visual explanations from deep networks via gradient-based localization. International Journal of Computer Vision, 2020, 128(2): 336\u2013359","journal-title":"International Journal of Computer Vision"},{"issue":"1","key":"40533_CR55","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1109\/TPAMI.2022.3144984","volume":"45","author":"Y Wu","year":"2023","unstructured":"Wu Y, Jiang L, Yang Y. Switchable novel object captioner. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2023, 45(1): 1162\u20131173","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"12","key":"40533_CR56","doi-asserted-by":"publisher","first-page":"1551","DOI":"10.1631\/FITEE.2100463","volume":"22","author":"Y Yang","year":"2021","unstructured":"Yang Y, Zhuang Y, Pan Y. Multiple knowledge representation for big data artificial intelligence: framework, applications, and case studies. Frontiers of Information Technology & Electronic Engineering, 2021, 22(12): 1551\u20131558","journal-title":"Frontiers of Information Technology & Electronic Engineering"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-024-40533-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-024-40533-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-024-40533-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T21:40:16Z","timestamp":1738100416000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-024-40533-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,28]]},"references-count":56,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["40533"],"URL":"https:\/\/doi.org\/10.1007\/s11704-024-40533-4","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,28]]},"assertion":[{"value":"26 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Competing interests The authors declare that they have no competing interests or financial conflicts to disclose.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics"}}],"article-number":"1910359"}}