{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T19:38:01Z","timestamp":1740166681063,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T00:00:00Z","timestamp":1568160000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T00:00:00Z","timestamp":1568160000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100010892","name":"Department of Science and Technology","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100010892","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004541","name":"Ministry of Human Resource Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004541","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Multimed Info Retr"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s13735-019-00177-8","type":"journal-article","created":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T13:03:59Z","timestamp":1568207039000},"page":"125-133","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A retrieval-based approach for diverse and image-specific adversary selection"],"prefix":"10.1007","volume":"9","author":[{"given":"Rajvardhan Singh","family":"Ravat","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2317-2641","authenticated-orcid":false,"given":"Yashaswi","family":"Verma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,11]]},"reference":[{"key":"177_CR1","volume-title":"Learning to attack: adversarial transformation networks","author":"S Baluja","year":"2018","unstructured":"Baluja S, Fischer I (2018) Learning to attack: adversarial transformation networks. Association for Advancements in Artificial Intelligence, Menlo Park"},{"key":"177_CR2","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-642-40994-3_25","volume-title":"Advanced Information Systems Engineering","author":"Battista Biggio","year":"2013","unstructured":"Biggio B, Corona I, Maiorca D, Nelson B, \u0160rndi\u0107 N, Laskov P, Giacinto G, Roli F (2013) Evasion attacks against machine learning at test time. In: Joint European conference on machine learning and knowledge discovery in databases, pp 387\u2013402"},{"key":"177_CR3","doi-asserted-by":"publisher","first-page":"1460002","DOI":"10.1142\/S0218001414600027","volume":"28","author":"B Biggio","year":"2014","unstructured":"Biggio B, Fumera G, Roli F (2014) Pattern recognition systems under attack: design issues and research challenges. Int J Pattern Recognit Artif Intell 28:1460002","journal-title":"Int J Pattern Recognit Artif Intell"},{"key":"177_CR4","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner DA (2017) Towards evaluating the robustness of neural networks. In: IEEE symposium on security and privacy, pp 39\u201357","DOI":"10.1109\/SP.2017.49"},{"key":"177_CR5","doi-asserted-by":"crossref","unstructured":"Chatfield K, Simonyan K, Vedaldi A, Zisserman A (2014) Return of the devil in the details: delving deep into convolutional nets. In: British machine vision conference","DOI":"10.5244\/C.28.6"},{"key":"177_CR6","unstructured":"Gong B, Chao W, Grauman K, Sha F (2014) Diverse sequential subset selection for supervised video summarization. In: Advances in neural information processing systems"},{"key":"177_CR7","unstructured":"Goodfellow I, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. In: International conference on learning representations"},{"key":"177_CR8","first-page":"2672","volume":"2","author":"IJ Goodfellow","year":"2014","unstructured":"Goodfellow IJ, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. Neural Inf Process Syst 2:2672\u20132680","journal-title":"Neural Inf Process Syst"},{"key":"177_CR9","unstructured":"Gu S, Rigazio L (2014) Towards deep neural network architectures robust to adversarial examples. CoRR \narXiv:1412.5068"},{"key":"177_CR10","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"177_CR11","doi-asserted-by":"crossref","unstructured":"Kulesza A, Taskar B (2011) k-DPPs: fixed-size determinantal point processes. In: International conference on machine learning","DOI":"10.1561\/9781601986290"},{"key":"177_CR12","unstructured":"Kulesza A, Taskar B (2011) Learning determinantal point processes. In: Uncertainty in artificial intelligence, pp 419\u2013427"},{"key":"177_CR13","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1561\/2200000044","volume":"5","author":"A Kulesza","year":"2012","unstructured":"Kulesza A, Taskar B (2012) Determinantal point processes for machine learning. Found Trends Mach Learn 5:123\u2013286","journal-title":"Found Trends Mach Learn"},{"key":"177_CR14","unstructured":"Kurakin A, Goodfellow IJ, Bengio S (2016) Adversarial machine learning at scale. CoRR \narXiv:1611.01236"},{"key":"177_CR15","doi-asserted-by":"publisher","first-page":"83","DOI":"10.2307\/1425855","volume":"7","author":"O Macchi","year":"1975","unstructured":"Macchi O (1975) The coincidence approach to stochastic point processes. Adv Appl Probab 7:83\u2013122. \nhttps:\/\/doi.org\/10.2307\/1425855","journal-title":"Adv Appl Probab"},{"key":"177_CR16","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2018) Towards deep learning models resistant to adversarial attacks. In: International conference on learning representations"},{"key":"177_CR17","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli S, Fawzi A, Frossard P (2016) Deepfool: a simple and accurate method to fool deep neural networks. In: IEEE conference on computer vision and pattern recognition, pp 2574\u20132582","DOI":"10.1109\/CVPR.2016.282"},{"key":"177_CR18","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli SM, Fawzi A, Fawzi O, Frossard P (2017) Universal adversarial perturbations. In: IEEE conference on computer vision and pattern recognition (CVPR), pp 86\u201394","DOI":"10.1109\/CVPR.2017.17"},{"key":"177_CR19","unstructured":"Mopuri KR, Garg U, Radhakrishnan VB (2017) Fast feature fool: a data independent approach to universal adversarial perturbations. In: British machine vision conference"},{"key":"177_CR20","doi-asserted-by":"crossref","unstructured":"Mopuri KR, Ojha U, Garg U, Babu RV (2018) NAG: network for adversary generation. In: IEEE conference on computer vision and pattern recognition, pp 742\u2013751","DOI":"10.1109\/CVPR.2018.00084"},{"key":"177_CR21","unstructured":"Nayebi A, Ganguli S (2017) Biologically inspired protection of deep networks from adversarial attacks. CoRR \narXiv:1703.09202"},{"key":"177_CR22","doi-asserted-by":"crossref","unstructured":"Papernot N, McDaniel P, Goodfellow I, Jha S, Celik ZB, Swami A (2017) Practical black-box attacks against machine learning. In: Asia conference on computer and communications security, pp 506\u2013519","DOI":"10.1145\/3052973.3053009"},{"key":"177_CR23","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2014) Intriguing properties of neural networks. In: International conference on learning representations"},{"key":"177_CR24","unstructured":"Tram\u00e8r F, Kurakin A, Papernot N, Goodfellow I, Boneh D, McDaniel P (2018) Ensemble adversarial training: attacks and defenses. In: International conference on learning representations"},{"key":"177_CR25","doi-asserted-by":"crossref","unstructured":"Wu B, Jia F, Liu W, Ghanem B (2017) Diverse image annotation. In: IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2017.656"}],"container-title":["International Journal of Multimedia Information Retrieval"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13735-019-00177-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13735-019-00177-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13735-019-00177-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T16:39:16Z","timestamp":1599755956000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13735-019-00177-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,11]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["177"],"URL":"https:\/\/doi.org\/10.1007\/s13735-019-00177-8","relation":{},"ISSN":["2192-6611","2192-662X"],"issn-type":[{"type":"print","value":"2192-6611"},{"type":"electronic","value":"2192-662X"}],"subject":[],"published":{"date-parts":[[2019,9,11]]},"assertion":[{"value":"26 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 July 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}