{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:07:12Z","timestamp":1749701232180,"version":"3.41.0"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T00:00:00Z","timestamp":1748390400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T00:00:00Z","timestamp":1748390400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62276216"],"award-info":[{"award-number":["62276216"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s11760-025-04181-w","type":"journal-article","created":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T13:46:48Z","timestamp":1748440008000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["IDSA: Integer-domain sparse adversarial attack"],"prefix":"10.1007","volume":"19","author":[{"given":"Jie","family":"Yang","sequence":"first","affiliation":[]},{"given":"Zitian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hongjun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tianrui","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,28]]},"reference":[{"issue":"6","key":"4181_CR1","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2012.2205597","volume":"29","author":"G Hinton","year":"2012","unstructured":"Hinton, G., Deng, L., Yu, D., Dahl, G.E., Mohamed, A.-R., Jaitly, N., Senior, A., Vanhoucke, V., Nguyen, P., Sainath, T.N., et al.: Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups. IEEE Signal processing magazine 29(6), 82\u201397 (2012)","journal-title":"IEEE Signal processing magazine"},{"key":"4181_CR2","unstructured":"Geifman, Y., El-Yaniv, R.: Selective classification for deep neural networks. Advances in neural information processing systems 30 (2017)"},{"key":"4181_CR3","unstructured":"Fu, J., Co-Reyes, J., Levine, S.: Ex2: Exploration with exemplar models for deep reinforcement learning. Neural Information Processing Systems, Neural Information Processing Systems (2017)"},{"key":"4181_CR4","doi-asserted-by":"crossref","unstructured":"Feng, W., Xu, N., Zhang, T., Zhang, Y.: Dynamic generative targeted attacks with pattern injection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 16404\u201316414 (2023)","DOI":"10.1109\/CVPR52729.2023.01574"},{"key":"4181_CR5","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)"},{"key":"4181_CR6","doi-asserted-by":"crossref","unstructured":"Chen, P.-Y., Sharma, Y., Zhang, H., Yi, J., Hsieh, C.-J.: Ead: elastic-net attacks to deep neural networks via adversarial examples. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 32 (2018)","DOI":"10.1609\/aaai.v32i1.11302"},{"key":"4181_CR7","doi-asserted-by":"crossref","unstructured":"Reza, M.F., Rahmati, A., Wu, T., Dai, H.: Cgba: curvature-aware geometric black-box attack. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 124\u2013133 (2023)","DOI":"10.1109\/ICCV51070.2023.00018"},{"key":"4181_CR8","unstructured":"Li, Y., Li, L., Wang, L., Zhang, T., Gong, B.: Nattack: Learning the distributions of adversarial examples for an improved black-box attack on deep neural networks. In: International Conference on Machine Learning, pp. 3866\u20133876 (2019). PMLR"},{"key":"4181_CR9","unstructured":"Brendel, W., Rauber, J., Bethge, M.: Decision-based adversarial attacks: Reliable attacks against black-box machine learning models. arXiv preprint arXiv:1712.04248 (2017)"},{"key":"4181_CR10","doi-asserted-by":"crossref","unstructured":"Williams, P.N., Li, K.: Black-box sparse adversarial attack via multi-objective optimisation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 12291\u201312301 (2023)","DOI":"10.1109\/CVPR52729.2023.01183"},{"key":"4181_CR11","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z.B., Swami, A.: The limitations of deep learning in adversarial settings. In: 2016 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 372\u2013387 (2016). IEEE","DOI":"10.1109\/EuroSP.2016.36"},{"issue":"5","key":"4181_CR12","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","volume":"23","author":"J Su","year":"2019","unstructured":"Su, J., Vargas, D.V., Sakurai, K.: One pixel attack for fooling deep neural networks. IEEE Transactions on Evolutionary Computation 23(5), 828\u2013841 (2019)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"4181_CR13","unstructured":"Karmon, D., Zoran, D., Goldberg, Y.: Lavan: Localized and visible adversarial noise. In: International Conference on Machine Learning, pp. 2507\u20132515 (2018). PMLR"},{"key":"4181_CR14","doi-asserted-by":"crossref","unstructured":"Croce, F., Hein, M.: Sparse and imperceivable adversarial attacks. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4724\u20134732 (2019)","DOI":"10.1109\/ICCV.2019.00482"},{"key":"4181_CR15","doi-asserted-by":"crossref","unstructured":"Fan, Y., Wu, B., Li, T., Zhang, Y., Li, M., Li, Z., Yang, Y.: Sparse adversarial attack via perturbation factorization. In: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part XXII 16, pp. 35\u201350 (2020). Springer","DOI":"10.1007\/978-3-030-58542-6_3"},{"key":"4181_CR16","doi-asserted-by":"crossref","unstructured":"Modas, A., Moosavi-Dezfooli, S., Frossard, P.: Sparsefool: A few pixels make a big difference. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 9079\u20139088. IEEE Computer Society, Los Alamitos, CA, USA (2019). 10.1109\/CVPR.2019.00930","DOI":"10.1109\/CVPR.2019.00930"},{"key":"4181_CR17","first-page":"11226","volume":"33","author":"X Dong","year":"2020","unstructured":"Dong, X., Chen, D., Bao, J., Qin, C., Yuan, L., Zhang, W., Yu, N., Chen, D.: Greedyfool: Distortion-aware sparse adversarial attack. Advances in Neural Information Processing Systems 33, 11226\u201311236 (2020)","journal-title":"Advances in Neural Information Processing Systems"},{"key":"4181_CR18","unstructured":"Zhu, M., Chen, T., Wang, Z.: Sparse and imperceptible adversarial attack via a homotopy algorithm. In: International Conference on Machine Learning, pp. 12868\u201312877 (2021). PMLR"},{"key":"4181_CR19","doi-asserted-by":"crossref","unstructured":"Cheng, L., Zhang, H., Zhang, J.: Color image sparse adversarial samples generation via color channel volterra expansion. Signal, Image and Video Processing, 1\u20139 (2024)","DOI":"10.1007\/s11760-024-03180-7"},{"key":"4181_CR20","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.-M., Fawzi, A., Frossard, P.: Deepfool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2574\u20132582 (2016)","DOI":"10.1109\/CVPR.2016.282"},{"key":"4181_CR21","unstructured":"Krizhevsky, A.: Learning multiple layers of features from tiny images (2009)"},{"key":"4181_CR22","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.-J., Li, K., Fei-Fei, L.: Imagenet: A large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248\u2013255 (2009). Ieee","DOI":"10.1109\/CVPR.2009.5206848"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-04181-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-025-04181-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-04181-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T07:13:22Z","timestamp":1749626002000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-025-04181-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,28]]},"references-count":22,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["4181"],"URL":"https:\/\/doi.org\/10.1007\/s11760-025-04181-w","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"type":"print","value":"1863-1703"},{"type":"electronic","value":"1863-1711"}],"subject":[],"published":{"date-parts":[[2025,5,28]]},"assertion":[{"value":"10 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"659"}}