{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T15:56:13Z","timestamp":1776441373311,"version":"3.51.2"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T00:00:00Z","timestamp":1735776000000},"content-version":"vor","delay-in-days":1,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s40747-024-01748-x","type":"journal-article","created":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T21:11:39Z","timestamp":1735852299000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["APDL: an adaptive step size method for white-box adversarial attacks"],"prefix":"10.1007","volume":"11","author":[{"given":"Jiale","family":"Hu","sequence":"first","affiliation":[]},{"given":"Xiang","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1901-4838","authenticated-orcid":false,"given":"Changzheng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ronghua","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Junwei","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yuedong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,2]]},"reference":[{"issue":"8","key":"1748_CR1","doi-asserted-by":"publisher","first-page":"5465","DOI":"10.1007\/s00371-023-03116-1","volume":"40","author":"Z Zhang","year":"2024","unstructured":"Zhang Z, Yin S, Cao L (2024) Age-invariant face recognition based on identity-age shared features. Vis Comput 40(8):5465\u20135474","journal-title":"Vis Comput"},{"key":"1748_CR2","unstructured":"Bojarski M, Del\u00a0Testa D, Dworakowski D et\u00a0al (2016) End to end learning for self-driving cars. arXiv preprint arXiv:1604.07316"},{"key":"1748_CR3","doi-asserted-by":"publisher","first-page":"181102","DOI":"10.1109\/ACCESS.2020.3028370","volume":"8","author":"Z Wang","year":"2020","unstructured":"Wang Z, Liu Q, Chi Y (2020) Review of android malware detection based on deep learning. IEEE Access 8:181102\u2013181126","journal-title":"IEEE Access"},{"issue":"13","key":"1748_CR4","doi-asserted-by":"publisher","first-page":"2972","DOI":"10.3390\/math11132972","volume":"11","author":"S Abdullah","year":"2023","unstructured":"Abdullah S, Almagrabi AO, Ali N (2023) A new method for commercial-scale water purification selection using linguistic neural networks. Mathematics 11(13):2972","journal-title":"Mathematics"},{"key":"1748_CR5","unstructured":"Szegedy C, Zaremba W, Sutskever I et\u00a0al (2013) Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199"},{"key":"1748_CR6","doi-asserted-by":"crossref","unstructured":"Zhu X, Deng H (2022) A security situation awareness approach for iot software chain based on markov game model. International Journal of Interactive Multimedia & Artificial Intelligence 7(5)","DOI":"10.9781\/ijimai.2022.08.002"},{"issue":"9","key":"1748_CR7","doi-asserted-by":"publisher","first-page":"2805","DOI":"10.1109\/TNNLS.2018.2886017","volume":"30","author":"X Yuan","year":"2019","unstructured":"Yuan X, He P, Zhu Q et al (2019) Adversarial examples: Attacks and defenses for deep learning. IEEE transactions on neural networks and learning systems 30(9):2805\u20132824","journal-title":"IEEE transactions on neural networks and learning systems"},{"key":"1748_CR8","doi-asserted-by":"crossref","unstructured":"Bai T, Zhao J, Zhu J et\u00a0al (2021) Ai-gan: Attack-inspired generation of adversarial examples. In: 2021 IEEE International Conference on Image Processing (ICIP), IEEE, pp 2543\u20132547","DOI":"10.1109\/ICIP42928.2021.9506278"},{"key":"1748_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108426","volume":"104","author":"S Namasudra","year":"2022","unstructured":"Namasudra S (2022) A secure cryptosystem using dna cryptography and dna steganography for the cloud-based iot infrastructure. Comput Electr Eng 104:108426","journal-title":"Comput Electr Eng"},{"key":"1748_CR10","doi-asserted-by":"crossref","unstructured":"Taj T, Sarkar M (2023) A survey on embedding iris biometric watermarking for user authentication. Cloud Computing and Data Science pp 203\u2013211","DOI":"10.37256\/ccds.4220233051"},{"key":"1748_CR11","unstructured":"Das S, Namasudra S (2022) A lightweight and anonymous mutual authentication scheme for medical big data in distributed smart healthcare systems. IEEE\/ACM Transactions on Computational Biology and Bioinformatics"},{"key":"1748_CR12","doi-asserted-by":"crossref","unstructured":"Kumar P, Rahman M, Namasudra S et\u00a0al (2023) Enhancing security of medical images using deep learning, chaotic map, and hash table. Mobile Networks and Applications pp 1\u201315","DOI":"10.1007\/s11036-023-02158-y"},{"key":"1748_CR13","doi-asserted-by":"crossref","unstructured":"Namasudra S (2018) Taxonomy of dna-based security models. In: Advances of DNA computing in cryptography. Chapman and Hall\/CRC, p 37\u201352","DOI":"10.1201\/9781351011419-3"},{"key":"1748_CR14","doi-asserted-by":"crossref","unstructured":"Taigman Y, Yang M, Ranzato M et\u00a0al (2014) Deepface: Closing the gap to human-level performance in face verification. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1701\u20131708","DOI":"10.1109\/CVPR.2014.220"},{"key":"1748_CR15","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572"},{"key":"1748_CR16","doi-asserted-by":"crossref","unstructured":"Kurakin A, Goodfellow IJ, Bengio S (2018) Adversarial examples in the physical world. In: Artificial intelligence safety and security. Chapman and Hall\/CRC, p 99\u2013112","DOI":"10.1201\/9781351251389-8"},{"key":"1748_CR17","doi-asserted-by":"crossref","unstructured":"Dong Y, Liao F, Pang T et\u00a0al (2018) Boosting adversarial attacks with momentum. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 9185\u20139193","DOI":"10.1109\/CVPR.2018.00957"},{"key":"1748_CR18","unstructured":"Lin J, Song C, He K et\u00a0al (2019) Nesterov accelerated gradient and scale invariance for adversarial attacks. arXiv preprint arXiv:1908.06281"},{"key":"1748_CR19","doi-asserted-by":"crossref","unstructured":"Dong Y, Pang T, Su H et\u00a0al (2019) Evading defenses to transferable adversarial examples by translation-invariant attacks. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 4312\u20134321","DOI":"10.1109\/CVPR.2019.00444"},{"key":"1748_CR20","doi-asserted-by":"publisher","first-page":"9572","DOI":"10.1109\/TMM.2023.3255742","volume":"25","author":"C Wan","year":"2023","unstructured":"Wan C, Huang F, Zhao X (2023) Average gradient-based adversarial attack. IEEE Trans Multimedia 25:9572\u20139585","journal-title":"IEEE Trans Multimedia"},{"key":"1748_CR21","doi-asserted-by":"crossref","unstructured":"Chen PY, Zhang H, Sharma Y et\u00a0al (2017) Zoo: Zeroth order optimization based black-box attacks to deep neural networks without training substitute models. In: Proceedings of the 10th ACM workshop on artificial intelligence and security, pp 15\u201326","DOI":"10.1145\/3128572.3140448"},{"key":"1748_CR22","doi-asserted-by":"crossref","unstructured":"Tu CC, Ting P, Chen PY et\u00a0al (2019) Autozoom: Autoencoder-based zeroth order optimization method for attacking black-box neural networks. In: Proceedings of the AAAI conference on artificial intelligence, pp 742\u2013749","DOI":"10.1609\/aaai.v33i01.3301742"},{"key":"1748_CR23","unstructured":"Zhang Z, Yu S (2021) Bo-dba: Query-efficient decision-based adversarial attacks via bayesian optimization. arXiv preprint arXiv:2106.02732"},{"issue":"16","key":"1748_CR24","doi-asserted-by":"publisher","first-page":"3613","DOI":"10.3390\/math11163613","volume":"11","author":"W Li","year":"2023","unstructured":"Li W, Liu X (2023) Adda: An adversarial direction-guided decision-based attack via multiple surrogate models. Mathematics 11(16):3613","journal-title":"Mathematics"},{"issue":"11","key":"1748_CR25","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M et al (2020) Generative adversarial networks. Commun ACM 63(11):139\u2013144","journal-title":"Commun ACM"},{"key":"1748_CR26","doi-asserted-by":"crossref","unstructured":"Xiao C, Li B, Zhu JY et\u00a0al (2018) Generating adversarial examples with adversarial networks. arXiv preprint arXiv:1801.02610","DOI":"10.24963\/ijcai.2018\/543"},{"key":"1748_CR27","doi-asserted-by":"crossref","unstructured":"Jandial S, Mangla P, Varshney S et\u00a0al (2019) Advgan++: Harnessing latent layers for adversary generation. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision Workshops, pp 0\u20130","DOI":"10.1109\/ICCVW.2019.00257"},{"key":"1748_CR28","doi-asserted-by":"crossref","unstructured":"Zhu Z, Chen H, Wang X et\u00a0al (2024) Ge-advgan: Improving the transferability of adversarial samples by gradient editing-based adversarial generative model. In: Proceedings of the 2024 SIAM International Conference on Data Mining (SDM), SIAM, pp 706\u2013714","DOI":"10.1137\/1.9781611978032.81"},{"key":"1748_CR29","doi-asserted-by":"crossref","unstructured":"Kumar N, Verma H, Sharma YK (2023) Adversarial attacks on graph neural network: Techniques and countermeasures. In: Concepts and Techniques of Graph Neural Networks. IGI Global, p 58\u201373","DOI":"10.4018\/978-1-6684-6903-3.ch005"},{"key":"1748_CR30","doi-asserted-by":"crossref","unstructured":"Gupta R, Akhtar N, Mian A et\u00a0al (2023) Contrastive self-supervised learning leads to higher adversarial susceptibility. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp 14838\u201314846","DOI":"10.1609\/aaai.v37i12.26733"},{"key":"1748_CR31","doi-asserted-by":"crossref","unstructured":"Zhao S, Yu J, Sun Z et\u00a0al (2022) Enhanced accuracy and robustness via multi-teacher adversarial distillation. In: European Conference on Computer Vision, Springer, pp 585\u2013602","DOI":"10.1007\/978-3-031-19772-7_34"},{"key":"1748_CR32","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli SM, Fawzi A, Fawzi O et\u00a0al (2017) Universal adversarial perturbations. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1765\u20131773","DOI":"10.1109\/CVPR.2017.17"},{"key":"1748_CR33","doi-asserted-by":"crossref","unstructured":"Weng J, Luo Z, Li S et\u00a0al (2023) Logit margin matters: Improving transferable targeted adversarial attack by logit calibration. IEEE Transactions on Information Forensics and Security","DOI":"10.1109\/TIFS.2023.3284649"},{"key":"1748_CR34","doi-asserted-by":"crossref","unstructured":"Szegedy C, Vanhoucke V, Ioffe S et\u00a0al (2016) Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2818\u20132826","DOI":"10.1109\/CVPR.2016.308"},{"key":"1748_CR35","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S et\u00a0al (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"1748_CR36","doi-asserted-by":"crossref","unstructured":"Huang G, Liu Z, Van Der\u00a0Maaten L et\u00a0al (2017) Densely connected convolutional networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 4700\u20134708","DOI":"10.1109\/CVPR.2017.243"},{"key":"1748_CR37","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556"},{"key":"1748_CR38","unstructured":"Wang A, Chen H, Liu L et\u00a0al (2024) Yolov10: Real-time end-to-end object detection. arXiv preprint arXiv:2405.14458"},{"key":"1748_CR39","doi-asserted-by":"crossref","unstructured":"Xie C, Zhang Z, Zhou Y et\u00a0al (2019) Improving transferability of adversarial examples with input diversity. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 2730\u20132739","DOI":"10.1109\/CVPR.2019.00284"},{"key":"1748_CR40","doi-asserted-by":"crossref","unstructured":"Gao L, Zhang Q, Song J et\u00a0al (2020) Patch-wise attack for fooling deep neural network. In: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part XXVIII 16, Springer, pp 307\u2013322","DOI":"10.1007\/978-3-030-58604-1_19"},{"key":"1748_CR41","unstructured":"Madry A, Makelov A, Schmidt L et\u00a0al (2017) Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083"},{"key":"1748_CR42","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 ieee symposium on security and privacy (sp), Ieee, pp 39\u201357","DOI":"10.1109\/SP.2017.49"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01748-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01748-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01748-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T20:21:48Z","timestamp":1738268508000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01748-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1748"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01748-x","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"27 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no financial or proprietary interests in any material discussed in this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"116"}}