{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T03:43:58Z","timestamp":1768967038824,"version":"3.49.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T00:00:00Z","timestamp":1721606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T00:00:00Z","timestamp":1721606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62221005"],"award-info":[{"award-number":["62221005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62276038"],"award-info":[{"award-number":["62276038"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007957","name":"Chongqing Municipal Education Commission","doi-asserted-by":"publisher","award":["HZ2021008"],"award-info":[{"award-number":["HZ2021008"]}],"id":[{"id":"10.13039\/501100007957","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012669","name":"Natural Science Foundation Project of Chongqing, Chongqing Science and Technology Commission","doi-asserted-by":"publisher","award":["cstc2021ycjh-bgzxm0013"],"award-info":[{"award-number":["cstc2021ycjh-bgzxm0013"]}],"id":[{"id":"10.13039\/501100012669","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s13042-024-02290-5","type":"journal-article","created":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T03:11:21Z","timestamp":1721617881000},"page":"789-802","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Adversarial attack method based on enhanced spatial momentum"],"prefix":"10.1007","volume":"16","author":[{"given":"Jun","family":"Hu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3477-1894","authenticated-orcid":false,"given":"Guanghao","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Shuyin","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Guoyin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,22]]},"reference":[{"key":"2290_CR1","doi-asserted-by":"publisher","first-page":"104268","DOI":"10.1016\/J.BSPC.2022.104268","volume":"80","author":"K Gupta","year":"2023","unstructured":"Gupta K, Bajaj V (2023) Deep learning models-based ct-scan image classification for automated screening of COVID-19. Biomed. Signal Process. Control. 80:104268. https:\/\/doi.org\/10.1016\/J.BSPC.2022.104268","journal-title":"Biomed. Signal Process. Control."},{"key":"2290_CR2","unstructured":"Senousy Z (2023) Medical image classification using deep learning techniques and uncertainty quantification. Ph.D. thesis, Birmingham City University"},{"key":"2290_CR3","doi-asserted-by":"publisher","first-page":"103687","DOI":"10.1016\/J.CVIU.2023.103687","volume":"232","author":"EG Pintelas","year":"2023","unstructured":"Pintelas EG, Livieris IE, Kotsiantis S, Pintelas PE (2023) A multi-view-cnn framework for deep representation learning in image classification. Comput. Vis. Image Underst. 232:103687. https:\/\/doi.org\/10.1016\/J.CVIU.2023.103687","journal-title":"Comput. Vis. Image Underst."},{"key":"2290_CR4","doi-asserted-by":"publisher","first-page":"22342","DOI":"10.1109\/ACCESS.2023.3252021","volume":"11","author":"Y Cao","year":"2023","unstructured":"Cao Y, Li C, Peng Y, Ru H (2023) MCS-YOLO: a multiscale object detection method for autonomous driving road environment recognition. IEEE Access 11:22342\u201322354. https:\/\/doi.org\/10.1109\/ACCESS.2023.3252021","journal-title":"IEEE Access"},{"key":"2290_CR5","doi-asserted-by":"publisher","unstructured":"Cai J, Du S, Lu C, Xiao B, Wu M (2023) Obstacle detection of unmanned surface vessel based on faster RCNN. In: Proceedings of the international conference on industrial cyber-physical systems, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICPS58381.2023.10128076","DOI":"10.1109\/ICPS58381.2023.10128076"},{"key":"2290_CR6","doi-asserted-by":"publisher","first-page":"35479","DOI":"10.1109\/ACCESS.2023.3266093","volume":"11","author":"AB Amjoud","year":"2023","unstructured":"Amjoud AB, Amrouch M (2023) Object detection using deep learning, cnns and vision transformers: a review. IEEE Access 11:35479\u201335516. https:\/\/doi.org\/10.1109\/ACCESS.2023.3266093","journal-title":"IEEE Access"},{"key":"2290_CR7","doi-asserted-by":"publisher","first-page":"120672","DOI":"10.1016\/J.ESWA.2023.120672","volume":"230","author":"SM Gonz\u00e1lez-Collazo","year":"2023","unstructured":"Gonz\u00e1lez-Collazo SM, Balado J, Gonz\u00e1lez E, Nurunnabi A (2023) A discordance analysis in manual labelling of urban mobile laser scanning data used for deep learning based semantic segmentation. Expert Syst Appl 230:120672. https:\/\/doi.org\/10.1016\/J.ESWA.2023.120672","journal-title":"Expert Syst Appl"},{"key":"2290_CR8","doi-asserted-by":"publisher","first-page":"110315","DOI":"10.1016\/J.ASOC.2023.110315","volume":"141","author":"F Barrientos-Espillco","year":"2023","unstructured":"Barrientos-Espillco F, Gasc\u00f3 E, L\u00f3pez-Gonz\u00e1lez CI, G\u00f3mez-Silva MJ, Pajares G (2023) Semantic segmentation based on deep learning for the detection of cyanobacterial harmful algal blooms (cyanohabs) using synthetic images. Appl Soft Comput 141:110315. https:\/\/doi.org\/10.1016\/J.ASOC.2023.110315","journal-title":"Appl Soft Comput"},{"key":"2290_CR9","doi-asserted-by":"publisher","unstructured":"Zheng S, Lu J, Zhao H, Zhu X, Luo Z, Wang Y, Fu Y, Feng J, Xiang T, Torr PHS, Zhang L (2021) Rethinking semantic segmentation from a sequence-to-sequence perspective with transformers. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 6881\u20136890. https:\/\/doi.org\/10.1109\/CVPR46437.2021.00681","DOI":"10.1109\/CVPR46437.2021.00681"},{"key":"2290_CR10","doi-asserted-by":"publisher","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. In: Proceedings of the international conference on learning representations. https:\/\/doi.org\/10.48550\/arXiv.1412.6572","DOI":"10.48550\/arXiv.1412.6572"},{"key":"2290_CR11","doi-asserted-by":"publisher","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow IJ, Fergus R (2014) Intriguing properties of neural networks. In: Proceedings of the international conference on learning representations. https:\/\/doi.org\/10.48550\/arXiv.1312.6199","DOI":"10.48550\/arXiv.1312.6199"},{"key":"2290_CR12","doi-asserted-by":"publisher","unstructured":"Liu A, Liu X, Fan J, Ma Y, Zhang A, Xie H, Tao D (2019) Perceptual-sensitive GAN for generating adversarial patches. In: Proceedings of the conference on artificial intelligence, pp 1028\u20131035. https:\/\/doi.org\/10.1609\/AAAI.V33I01.33011028","DOI":"10.1609\/AAAI.V33I01.33011028"},{"key":"2290_CR13","doi-asserted-by":"publisher","unstructured":"Xiao Z, Gao X, Fu C, Dong Y, Gao W, Zhang X, Zhou J, Zhu J (2021) Improving transferability of adversarial patches on face recognition with generative models. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 11845\u201311854. https:\/\/doi.org\/10.1109\/CVPR46437.2021.01167","DOI":"10.1109\/CVPR46437.2021.01167"},{"key":"2290_CR14","doi-asserted-by":"publisher","unstructured":"Li S, Neupane A, Paul S, Song C, Krishnamurthy SV, Roy-Chowdhury AK, Swami A (2019) Stealthy adversarial perturbations against real-time video classification systems. In: Proceedings of the network and distributed system security symposium. https:\/\/doi.org\/10.14722\/ndss.2019.23202","DOI":"10.14722\/ndss.2019.23202"},{"issue":"11","key":"2290_CR15","doi-asserted-by":"publisher","first-page":"3325","DOI":"10.1007\/S13042-020-01242-Z","volume":"12","author":"H Ren","year":"2021","unstructured":"Ren H, Huang T, Yan H (2021) Adversarial examples: attacks and defenses in the physical world. Int J Mach Learn Cybern 12(11):3325\u20133336. https:\/\/doi.org\/10.1007\/S13042-020-01242-Z","journal-title":"Int J Mach Learn Cybern"},{"issue":"4","key":"2290_CR16","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1007\/S13042-021-01435-0","volume":"13","author":"A Pedraza","year":"2022","unstructured":"Pedraza A, D\u00e9niz-Su\u00e1rez O, Bueno G (2022) Really natural adversarial examples. Int J Mach Learn Cybern 13(4):1065\u20131077. https:\/\/doi.org\/10.1007\/S13042-021-01435-0","journal-title":"Int J Mach Learn Cybern"},{"key":"2290_CR17","doi-asserted-by":"publisher","unstructured":"Tram\u00e8r F, Kurakin A, Papernot N, Goodfellow IJ, Dan B, Mcdaniel PD (2018) Ensemble adversarial training: Attacks and defenses. In: Proceedings of the international conference on learning representations. https:\/\/doi.org\/10.48550\/arXiv.1705.07204","DOI":"10.48550\/arXiv.1705.07204"},{"key":"2290_CR18","doi-asserted-by":"publisher","unstructured":"Kurakin A, Goodfellow IJ, Bengio S (2017) Adversarial examples in the physical world. In: Proceedings of the international conference on learning representations. https:\/\/doi.org\/10.48550\/arXiv.1607.02533","DOI":"10.48550\/arXiv.1607.02533"},{"key":"2290_CR19","doi-asserted-by":"publisher","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2018) Towards deep learning models resistant to adversarial attacks. In: Proceedings of the international conference on learning representations. https:\/\/doi.org\/10.48550\/arXiv.1706.06083","DOI":"10.48550\/arXiv.1706.06083"},{"key":"2290_CR20","doi-asserted-by":"publisher","unstructured":"Carlini N, Wagner DA (2017) Towards evaluating the robustness of neural networks. In: Symposium on security and privacy, pp 39\u201357. https:\/\/doi.org\/10.1109\/SP.2017.49","DOI":"10.1109\/SP.2017.49"},{"key":"2290_CR21","doi-asserted-by":"publisher","unstructured":"Vo VQ, Abbasnejad E, Ranasinghe D (2022) Query efficient decision based sparse attacks against black-box deep learning models. In: Proceedings of the international conference on learning representations. https:\/\/doi.org\/10.48550\/arXiv.2202.00091","DOI":"10.48550\/arXiv.2202.00091"},{"key":"2290_CR22","doi-asserted-by":"publisher","unstructured":"Mou N, Zheng B, Wang Q, Ge Y, Guo B (2022) A few seconds can change everything: Fast decision-based attacks against dnns. In: Proceedings of the international joint conference on artificial intelligence, pp 3342\u20133350. https:\/\/doi.org\/10.24963\/IJCAI.2022\/464","DOI":"10.24963\/IJCAI.2022\/464"},{"key":"2290_CR23","doi-asserted-by":"publisher","unstructured":"Zeng B, Gao L, Zhang Q, Li C, Song J, Jing S (2023) Boosting adversarial attacks by leveraging decision boundary information. CoRR abs\/2303.05719https:\/\/doi.org\/10.48550\/ARXIV.2303.05719","DOI":"10.48550\/ARXIV.2303.05719"},{"issue":"12","key":"2290_CR24","doi-asserted-by":"publisher","first-page":"9536","DOI":"10.1109\/TPAMI.2021.3126733","volume":"44","author":"Y Dong","year":"2022","unstructured":"Dong Y, Cheng S, Pang T, Su H, Zhu J (2022) Query-efficient black-box adversarial attacks guided by a transfer-based prior. IEEE Trans Pattern Anal Mach Intell 44(12):9536\u20139548. https:\/\/doi.org\/10.1109\/TPAMI.2021.3126733","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"2290_CR25","doi-asserted-by":"publisher","first-page":"109037","DOI":"10.1016\/J.PATCOG.2022.109037","volume":"133","author":"Y Bai","year":"2023","unstructured":"Bai Y, Wang Y, Zeng Y, Jiang Y, Xia S (2023) Query efficient black-box adversarial attack on deep neural networks. Pattern Recognit 133:109037. https:\/\/doi.org\/10.1016\/J.PATCOG.2022.109037","journal-title":"Pattern Recognit"},{"key":"2290_CR26","doi-asserted-by":"publisher","unstructured":"Papernot N, McDaniel PD, Goodfellow IJ (2016) Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. CoRR abs\/1605.07277https:\/\/doi.org\/10.48550\/arXiv.1605.07277","DOI":"10.48550\/arXiv.1605.07277"},{"key":"2290_CR27","doi-asserted-by":"publisher","unstructured":"Papernot N, McDaniel PD, Goodfellow IJ, Jha S, Celik ZB, Swami A (2017) Practical black-box attacks against machine learning. In: Proceedings of the Asia conference on computer and communications security, pp 506\u2013519. https:\/\/doi.org\/10.1145\/3052973.3053009","DOI":"10.1145\/3052973.3053009"},{"key":"2290_CR28","doi-asserted-by":"publisher","unstructured":"Liu Y, Chen X, Liu C, Song D (2017) Delving into transferable adversarial examples and black-box attacks. In: Proceedings of the international conference on learning representations. https:\/\/doi.org\/10.48550\/arXiv.1611.02770","DOI":"10.48550\/arXiv.1611.02770"},{"key":"2290_CR29","doi-asserted-by":"publisher","unstructured":"Dong Y, Liao F, Pang T, Su H, Zhu J, Hu X, Li J (2018) Boosting adversarial attacks with momentum. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 9185\u20139193. https:\/\/doi.org\/10.1109\/CVPR.2018.00957","DOI":"10.1109\/CVPR.2018.00957"},{"key":"2290_CR30","doi-asserted-by":"publisher","unstructured":"Lin J, Song C, He K, Wang L, Hopcroft JE (2020) Nesterov accelerated gradient and scale invariance for adversarial attacks. In: Proceedings of the international conference on learning representations. https:\/\/doi.org\/10.48550\/arXiv.1908.06281","DOI":"10.48550\/arXiv.1908.06281"},{"key":"2290_CR31","doi-asserted-by":"publisher","unstructured":"Wang X, He K (2021) Enhancing the transferability of adversarial attacks through variance tuning. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 1924\u20131933. https:\/\/doi.org\/10.1109\/CVPR46437.2021.00196","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"2290_CR32","doi-asserted-by":"publisher","first-page":"2250005","DOI":"10.1142\/S2811032322500059","volume":"1","author":"T Wu","year":"2023","unstructured":"Wu T, Luo T, Wunsch DC (2023) Black-box attack using adversarial examples: a new method of improving transferability. World Sci Annu Rev Artif Intell 1:2250005\u20132250023. https:\/\/doi.org\/10.1142\/S2811032322500059","journal-title":"World Sci Annu Rev Artif Intell"},{"key":"2290_CR33","doi-asserted-by":"publisher","first-page":"103693","DOI":"10.1016\/J.CSI.2022.103693","volume":"84","author":"X Wang","year":"2023","unstructured":"Wang X, Huang C, Cheng H (2023) Improving transferability of adversarial examples with powerful affine-shear transformation attack. Comput Stand Interfaces 84:103693. https:\/\/doi.org\/10.1016\/J.CSI.2022.103693","journal-title":"Comput Stand Interfaces"},{"key":"2290_CR34","doi-asserted-by":"publisher","first-page":"108824","DOI":"10.1016\/J.PATCOG.2022.108824","volume":"130","author":"Z Hu","year":"2022","unstructured":"Hu Z, Li H, Yuan L, Cheng Z, Yuan W, Zhu M (2022) Model scheduling and sample selection for ensemble adversarial example attacks. Pattern Recognit 130:108824. https:\/\/doi.org\/10.1016\/J.PATCOG.2022.108824","journal-title":"Pattern Recognit"},{"key":"2290_CR35","doi-asserted-by":"publisher","unstructured":"Xie C, Zhang Z, Zhou Y, Bai S, Wang J, Ren Z, Yuille AL (2019) Improving transferability of adversarial examples with input diversity. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 2730\u20132739. https:\/\/doi.org\/10.1109\/CVPR.2019.00284","DOI":"10.1109\/CVPR.2019.00284"},{"key":"2290_CR36","doi-asserted-by":"publisher","unstructured":"Dong Y, Pang T, Su H, Zhu J (2019) Evading defenses to transferable adversarial examples by translation-invariant attacks. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 4312\u20134321. https:\/\/doi.org\/10.1109\/CVPR.2019.00444","DOI":"10.1109\/CVPR.2019.00444"},{"key":"2290_CR37","doi-asserted-by":"publisher","unstructured":"Wang X, He X, Wang J, He K (2021) Admix: Enhancing the transferability of adversarial attacks. In: Proceedings of the international conference on computer vision, pp 16138\u201316147. https:\/\/doi.org\/10.1109\/ICCV48922.2021.01585","DOI":"10.1109\/ICCV48922.2021.01585"},{"key":"2290_CR38","doi-asserted-by":"publisher","unstructured":"Zhang H, Ciss\u00e9 M, Dauphin YN, Lopez-Paz D (2018) mixup: beyond empirical risk minimization. In: Proceedings of the international conference on learning representations. https:\/\/doi.org\/10.48550\/arXiv.1710.09412","DOI":"10.48550\/arXiv.1710.09412"},{"key":"2290_CR39","doi-asserted-by":"publisher","unstructured":"Liao F, Liang M, Dong Y, Pang T, Hu X, Zhu J (2018) Defense against adversarial attacks using high-level representation guided denoiser. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 1778\u20131787. https:\/\/doi.org\/10.48550\/arXiv.1712.02976","DOI":"10.48550\/arXiv.1712.02976"},{"key":"2290_CR40","doi-asserted-by":"publisher","unstructured":"Xie C, Wang J, Zhang Z, Ren Z, Yuille AL (2018) Mitigating adversarial effects through randomization. In: Proceedings of the international conference on learning representations. https:\/\/doi.org\/10.48550\/arXiv.1711.01991","DOI":"10.48550\/arXiv.1711.01991"},{"key":"2290_CR41","doi-asserted-by":"publisher","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 2818\u20132826. https:\/\/doi.org\/10.1109\/CVPR.2016.308","DOI":"10.1109\/CVPR.2016.308"},{"key":"2290_CR42","doi-asserted-by":"publisher","unstructured":"Cohen J, Rosenfeld E, Kolter JZ (2019) Certified adversarial robustness via randomized smoothing. In: Proceedings of the international conference on machine learning, vol 97, pp 1310\u20131320. https:\/\/doi.org\/10.48550\/arXiv.1902.02918","DOI":"10.48550\/arXiv.1902.02918"},{"key":"2290_CR43","doi-asserted-by":"publisher","unstructured":"Xu W, Evans D, Qi Y (2018) Feature squeezing: Detecting adversarial examples in deep neural networks. In: Proceedings of the international conference on annual network and distributed system security symposium. https:\/\/doi.org\/10.14722\/ndss.2018.23198","DOI":"10.14722\/ndss.2018.23198"},{"key":"2290_CR44","doi-asserted-by":"publisher","unstructured":"Liu Z, Liu Q, Liu T, Xu N, Lin X, Wang Y, Wen W (2019) Feature distillation: Dnn-oriented JPEG compression against adversarial examples. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 860\u2013868. https:\/\/doi.org\/10.1109\/CVPR.2019.00095","DOI":"10.1109\/CVPR.2019.00095"},{"key":"2290_CR45","doi-asserted-by":"publisher","unstructured":"Jia X, Wei X, Cao X, Foroosh H (2019) Comdefend: an efficient image compression model to defend adversarial examples. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 6084\u20136092. https:\/\/doi.org\/10.1109\/CVPR.2019.00624","DOI":"10.1109\/CVPR.2019.00624"},{"key":"2290_CR46","doi-asserted-by":"publisher","unstructured":"Naseer M, Khan SH, Hayat M, Khan FS, Porikli F (2020) A self-supervised approach for adversarial robustness. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 259\u2013268. https:\/\/doi.org\/10.1109\/CVPR42600.2020.00034","DOI":"10.1109\/CVPR42600.2020.00034"},{"issue":"3","key":"2290_CR47","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/S11263-015-0816-Y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky O, Deng J, Su H, Krause J, Satheesh S, Ma S, Huang Z, Karpathy A, Khosla A, Bernstein MS, Berg AC, Fei-Fei L (2015) Imagenet large scale visual recognition challenge. Int J Comput Vis 115(3):211\u2013252. https:\/\/doi.org\/10.1007\/S11263-015-0816-Y","journal-title":"Int J Comput Vis"},{"key":"2290_CR48","doi-asserted-by":"publisher","unstructured":"Szegedy C, Ioffe S, Vanhoucke V, Alemi AA (2017) Inception-v4, inception-resnet and the impact of residual connections on learning. In: Proceedings of the conference on artificial intelligence, pp 4278\u20134284. https:\/\/doi.org\/10.1609\/AAAI.V31I1.11231","DOI":"10.1609\/AAAI.V31I1.11231"},{"key":"2290_CR49","doi-asserted-by":"publisher","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 770\u2013778. https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02290-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-024-02290-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02290-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T10:40:51Z","timestamp":1738665651000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-024-02290-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,22]]},"references-count":49,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["2290"],"URL":"https:\/\/doi.org\/10.1007\/s13042-024-02290-5","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,22]]},"assertion":[{"value":"21 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}