{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:11:24Z","timestamp":1772043084767,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T00:00:00Z","timestamp":1718668800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T00:00:00Z","timestamp":1718668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"University Stability Support Program of Shenzhen","award":["GXWD20231130113127003"],"award-info":[{"award-number":["GXWD20231130113127003"]}]},{"name":"the Major Key Project of PCL","award":["PCL2022A03"],"award-info":[{"award-number":["PCL2022A03"]}]},{"name":"Shenzhen Science and Technology Program","award":["ZDSYS20210623091809029"],"award-info":[{"award-number":["ZDSYS20210623091809029"]}]},{"name":"Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies","award":["2022B1212010005"],"award-info":[{"award-number":["2022B1212010005"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Adversarial examples which mislead deep neural networks by adding well-crafted perturbations have become a major threat to classification models. Gradient-based white-box attack algorithms have been widely used to generate adversarial examples. However, most of them are designed for multi-class models, and only a few gradient-based adversarial attack algorithms specifically designed for multi-label classification models. Due to the correlation between multiple labels, the performance of these gradient-based algorithms in generating adversarial examples for multi-label classification is worthy of analyzing and evaluating comprehensively. In this paper, we first transplant five typical gradient-based adversarial attack algorithms in the multi-class environment to the multi-label environment. Secondly, we comprehensively compared the performance of these five attack algorithms and the other four existing multi-label adversarial attack algorithms by experiments on six different attack types, and evaluated the transferability of adversarial examples generated by all algorithms under two attack types. Experimental results show that, among different attack types, the majority of multi-step attack algorithms have higher attack success rates compared to one-step attack algorithms. Additionally, these gradient-based algorithms face greater difficulty in augmenting labels than in hiding them. For transfer experimental results, the adversarial examples generated by all attack algorithms exhibit weaker transferability when attacking other different models.<\/jats:p>","DOI":"10.1007\/s40747-024-01506-z","type":"journal-article","created":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T07:03:26Z","timestamp":1718694206000},"page":"6667-6692","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Comprehensive comparisons of gradient-based multi-label adversarial attacks"],"prefix":"10.1007","volume":"10","author":[{"given":"Zhijian","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8357-1655","authenticated-orcid":false,"given":"Wenjian","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Muhammad Luqman","family":"Naseem","sequence":"additional","affiliation":[]},{"given":"Linghao","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Xiangkai","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,18]]},"reference":[{"key":"1506_CR1","unstructured":"Huang K, Shi B, Li X, Li X, Huang S, Li Y (2022) Multi-modal sensor fusion for auto driving perception: a survey. arXiv preprint arXiv:2202.02703"},{"key":"1506_CR2","first-page":"4425","volume":"35","author":"L Wu","year":"2022","unstructured":"Wu L, He X, Wang X, Zhang K, Wang M (2022) A survey on accuracy-oriented neural recommendation: from collaborative filtering to information-rich recommendation. IEEE Trans Knowl Data Eng 35:4425\u20134445","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"6","key":"1506_CR3","doi-asserted-by":"publisher","first-page":"9411","DOI":"10.1007\/s11042-020-10073-7","volume":"80","author":"M Malik","year":"2021","unstructured":"Malik M, Malik MK, Mehmood K, Makhdoom I (2021) Automatic speech recognition: a survey. Multimed Tools Appl 80(6):9411\u20139457","journal-title":"Multimed Tools Appl"},{"key":"1506_CR4","doi-asserted-by":"publisher","unstructured":"Chowdhary KR (2020) Natural language processing. In: Fundamentals of artificial Intelligence. Springer, New Delhi, p 603\u2013649. https:\/\/doi.org\/10.1007\/978-81-322-3972-7_19","DOI":"10.1007\/978-81-322-3972-7_19"},{"key":"1506_CR5","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar N, Mian A (2018) Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 6:14410\u201314430. https:\/\/doi.org\/10.1109\/ACCESS.2018.2807385","journal-title":"IEEE Access"},{"key":"1506_CR6","unstructured":"Wiyatno RR, Xu A, Dia O, De\u00a0Berker A (2019) Adversarial examples in modern machine learning: a review. arXiv preprint arXiv:1911.05268"},{"issue":"7","key":"1506_CR7","first-page":"2578","volume":"31","author":"J Zhang","year":"2019","unstructured":"Zhang J, Li C (2019) Adversarial examples: opportunities and challenges. IEEE Trans Neural Netw Learn Syst 31(7):2578\u20132593","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"1506_CR8","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199"},{"issue":"4","key":"1506_CR9","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1145\/279232.279236","volume":"23","author":"C Zhu","year":"1997","unstructured":"Zhu C, Byrd RH, Lu P, Nocedal J (1997) Algorithm 778: L-BFGS-B: Fortran subroutines for large-scale bound-constrained optimization. ACM Trans Math Softw (TOMS) 23(4):550\u2013560","journal-title":"ACM Trans Math Softw (TOMS)"},{"issue":"1","key":"1506_CR10","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1049\/cit2.12028","volume":"6","author":"A Chakraborty","year":"2021","unstructured":"Chakraborty A, Alam M, Dey V, Chattopadhyay A, Mukhopadhyay D (2021) A survey on adversarial attacks and defences. CAAI Trans Intell Technol 6(1):25\u201345","journal-title":"CAAI Trans Intell Technol"},{"key":"1506_CR11","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572"},{"key":"1506_CR12","unstructured":"Miyato T, Dai AM, Goodfellow I (2016) Adversarial training methods for semi-supervised text classification. arXiv preprint arXiv:1605.07725"},{"key":"1506_CR13","doi-asserted-by":"crossref","unstructured":"Kurakin A, Goodfellow IJ, Bengio S (2018) Adversarial examples in the physical world. In: Artificial intelligence safety and security. Chapman and Hall\/CRC, pp 99\u2013112","DOI":"10.1201\/9781351251389-8"},{"key":"1506_CR14","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2017) Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083"},{"key":"1506_CR15","unstructured":"Tramer F, Boneh D (2019) Adversarial training and robustness for multiple perturbations. Adv Neural Inf Process Syst 32:1\u201311"},{"key":"1506_CR16","doi-asserted-by":"crossref","unstructured":"Dong Y, Liao F, Pang T, Su H, Zhu J, Hu X, Li J (2018) Boosting adversarial attacks with momentum. In: Proceedings of the IEEE conference on computer vision and pattern recognition , Salt Lake City, UT, USA. pp 9185\u20139193","DOI":"10.1109\/CVPR.2018.00957"},{"key":"1506_CR17","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli S-M, Fawzi A, Frossard P (2016) DeepFool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition , Las Vegas, NV, USA. pp 2574\u20132582","DOI":"10.1109\/CVPR.2016.282"},{"key":"1506_CR18","doi-asserted-by":"crossref","unstructured":"Papernot N, McDaniel P, Jha S, Fredrikson M, Celik ZB, Swami A (2016) The limitations of deep learning in adversarial settings. In: IEEE European symposium on security and privacy (EuroS &P). IEEE, 372\u2013387","DOI":"10.1109\/EuroSP.2016.36"},{"issue":"3","key":"1506_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jdwm.2007070101","volume":"3","author":"G Tsoumakas","year":"2007","unstructured":"Tsoumakas G, Katakis I (2007) Multi-label classification: an overview. Int J Data Warehous Min (IJDWM) 3(3):1\u201313","journal-title":"Int J Data Warehous Min (IJDWM)"},{"issue":"8","key":"1506_CR20","doi-asserted-by":"publisher","first-page":"1819","DOI":"10.1109\/TKDE.2013.39","volume":"26","author":"M-L Zhang","year":"2013","unstructured":"Zhang M-L, Zhou Z-H (2013) A review on multi-label learning algorithms. IEEE Trans Knowl Data Eng 26(8):1819\u20131837","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1506_CR21","doi-asserted-by":"crossref","unstructured":"Zhou N, Luo W, Lin X, Xu P, Zhang Z (2020) Generating multi-label adversarial examples by linear programming. In: 2020 International joint conference on neural networks (IJCNN). IEEE, pp 1\u20138","DOI":"10.1109\/IJCNN48605.2020.9206614"},{"key":"1506_CR22","doi-asserted-by":"publisher","unstructured":"Song Q, Jin H, Huang X, Hu X (2018) Multi-label adversarial perturbations. In: 2018 IEEE international conference on data mining (ICDM), Singapore, Singapore. pp. 1242\u20131247. https:\/\/doi.org\/10.1109\/ICDM.2018.00166","DOI":"10.1109\/ICDM.2018.00166"},{"key":"1506_CR23","doi-asserted-by":"crossref","unstructured":"Deng J, Dong W, Socher R, Li L-J, Li K, Fei-Fei L (2009) ImageNet: a large-scale hierarchical image database. In: IEEE conference on computer vision and pattern recognition. IEEE, pp 248\u2013255","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"1506_CR24","doi-asserted-by":"crossref","unstructured":"Zhou N, Luo W, Zhang J, Kong L, Zhang H (2021) Hiding all labels for multi-label images: an empirical study of adversarial examples. In: 2021 International joint conference on neural networks (IJCNN). IEEE, pp 1\u20138","DOI":"10.1109\/IJCNN52387.2021.9534067"},{"issue":"2","key":"1506_CR25","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11263-009-0275-4","volume":"88","author":"M Everingham","year":"2010","unstructured":"Everingham M, Van Gool L, Williams CK, Winn J, Zisserman A (2010) The pascal visual object classes (voc) challenge. Int J Comput Vis 88(2):303\u2013338","journal-title":"Int J Comput Vis"},{"issue":"1","key":"1506_CR26","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/s11263-014-0733-5","volume":"111","author":"M Everingham","year":"2015","unstructured":"Everingham M, Eslami S, Van Gool L, Williams CK, Winn J, Zisserman A (2015) The pascal visual object classes challenge: a retrospective. Int J Comput Vis 111(1):98\u2013136","journal-title":"Int J Comput Vis"},{"key":"1506_CR27","doi-asserted-by":"publisher","unstructured":"Chen Z-M, Wei X-S, Wang P, Guo Y (2019) Multi-label image recognition with graph convolutional networks. In: IEEE\/CVF conference on computer vision and pattern recognition (CVPR). pp 5172\u20135181. https:\/\/doi.org\/10.1109\/CVPR.2019.00532","DOI":"10.1109\/CVPR.2019.00532"},{"key":"1506_CR28","doi-asserted-by":"crossref","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE conference on computer vision and pattern recognition, Las Vegas, NV, USA. pp 2818\u20132826","DOI":"10.1109\/CVPR.2016.308"},{"key":"1506_CR29","unstructured":"Ding GW, Wang L, Jin X (2019) AdverTorch v0. 1: an adversarial robustness toolbox based on pytorch. arXiv preprint arXiv:1902.07623"},{"key":"1506_CR30","unstructured":"Paszke A, Gross S, Massa F, Lerer A, Bradbury J, Chanan G, Killeen T, Lin Z, Gimelshein N, Antiga L et\u00a0al (2019) PyTorch: an imperative style, high-performance deep learning library. Adv Neural Inf Process Syst 32:1\u201312"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01506-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01506-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01506-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T15:15:03Z","timestamp":1726326903000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01506-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,18]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["1506"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01506-z","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,18]]},"assertion":[{"value":"13 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}