{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:45:49Z","timestamp":1740149149728,"version":"3.37.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T00:00:00Z","timestamp":1724112000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T00:00:00Z","timestamp":1724112000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61801512","62071484"],"award-info":[{"award-number":["61801512","62071484"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Intell Syst"],"DOI":"10.1007\/s44196-024-00617-2","type":"journal-article","created":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T03:52:42Z","timestamp":1724298762000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing the Transferability of Adversarial Patch via Alternating Minimization"],"prefix":"10.1007","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4514-2534","authenticated-orcid":false,"given":"Yang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Lei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Tieyong","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,20]]},"reference":[{"issue":"6","key":"617_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. Commun. ACM 60(6), 84\u201390 (2017). https:\/\/doi.org\/10.1145\/3065386","journal-title":"Commun. ACM"},{"key":"617_CR2","doi-asserted-by":"publisher","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770\u2013778 (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"617_CR3","doi-asserted-by":"publisher","unstructured":"Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., Erhan, D., Vanhoucke, V., Rabinovich, A.: Going deeper with convolutions. In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1\u20139 (2015). https:\/\/doi.org\/10.1109\/CVPR.2015.7298594","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"617_CR4","doi-asserted-by":"publisher","unstructured":"Zhang, H., Wu, C., Zhang, Z., Zhu, Y., Lin, H., Zhang, Z., Sun, Y., He, T., Mueller, J., Manmatha, R., Li, M., Smola, A.: Resnest: Split-attention networks. In: 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 2735\u20132745 (2022). https:\/\/doi.org\/10.1109\/CVPRW56347.2022.00309","DOI":"10.1109\/CVPRW56347.2022.00309"},{"key":"617_CR5","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., Fergus, R.: Intriguing properties of neural networks. Preprint (2013). arXiv:1312.6199"},{"issue":"1","key":"617_CR6","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s44196-023-00266-x","volume":"16","author":"B Rasheed","year":"2023","unstructured":"Rasheed, B., Masood Khattak, A., Khan, A., Protasov, S., Ahmad, M.: Boosting adversarial training using robust selective data augmentation. Int. J. Comput. Intell. Syst. 16(1), 89 (2023). https:\/\/doi.org\/10.1007\/s44196-023-00266-x","journal-title":"Int. J. Comput. Intell. Syst."},{"issue":"1","key":"617_CR7","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/s44196-023-00376-6","volume":"16","author":"YM Khedr","year":"2023","unstructured":"Khedr, Y.M., Xiong, Y., He, K.: Semantic adversarial attacks on face recognition through significant attributes. Int. J. Comput. Intell. Syst. 16(1), 196 (2023). https:\/\/doi.org\/10.1007\/s44196-023-00376-6","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"617_CR8","doi-asserted-by":"publisher","DOI":"10.1186\/s12859-024-05729-2","author":"KGGO Tutsoy","year":"2024","unstructured":"Tutsoy, K.G.G.O.: Deep self-supervised machine learning algorithms with a novel feature elimination and selection approaches for blood test-based multi-dimensional health risks classification. BMC Bioinform. (2024). https:\/\/doi.org\/10.1186\/s12859-024-05729-2","journal-title":"BMC Bioinform."},{"key":"617_CR9","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I.: Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. Preprint (2016). arXiv:1605.07277"},{"key":"617_CR10","doi-asserted-by":"publisher","unstructured":"Wu, W., Su, Y., Chen, X., Zhao, S., King, I., Lyu, M.R., Tai, Y.-W.: Boosting the transferability of adversarial samples via attention. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1158\u20131167 (2020). https:\/\/doi.org\/10.1109\/CVPR42600.2020.00124","DOI":"10.1109\/CVPR42600.2020.00124"},{"key":"617_CR11","unstructured":"Liu, Y., Chen, X., Liu, C., Song, D.: Delving into transferable adversarial examples and black-box attacks. In: ICML (2016)"},{"key":"617_CR12","doi-asserted-by":"publisher","unstructured":"Dong, Y., Liao, F., Pang, T., Su, H., Zhu, J., Hu, X., Li, J.: Boosting adversarial attacks with momentum. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9185\u20139193 (2018). https:\/\/doi.org\/10.1109\/CVPR.2018.00957","DOI":"10.1109\/CVPR.2018.00957"},{"key":"617_CR13","unstructured":"Lin, J., Song, C., He, K., Wang, L., Hopcroft, J.E.: Nesterov accelerated gradient and scale invariance for adversarial attacks. In: ICLR (2020)"},{"key":"617_CR14","doi-asserted-by":"publisher","unstructured":"Wang, X., He, K.: Enhancing the transferability of adversarial attacks through variance tuning. In: 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1924\u20131933 (2021). https:\/\/doi.org\/10.1109\/CVPR46437.2021.00196","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"617_CR15","unstructured":"Wang, X., Lin, J., Hu, H., Wang, J., He, K.: Boosting adversarial transferability through enhanced momentum. Preprint (2021). arXiv:2103.10609"},{"key":"617_CR16","unstructured":"Brown, T.B., Man\u00e9, D., Roy, A., Abadi, M., Gilmer, J.: Adversarial patch. Preprint (2017). arXiv:1712.09665"},{"key":"617_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3231886","author":"X Wei","year":"2022","unstructured":"Wei, X., Guo, Y., Yu, J., Zhang, B.: Simultaneously optimizing perturbations and positions for black-box adversarial patch attacks. IEEE Trans. Pattern Anal. Mach. Intell. (2022). https:\/\/doi.org\/10.1109\/TPAMI.2022.3231886","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"617_CR18","doi-asserted-by":"publisher","unstructured":"Chen, J., Jordan, M.I., Wainwright, M.J.: Hopskipjumpattack: a query-efficient decision-based attack. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 1277\u20131294 (2020). https:\/\/doi.org\/10.1109\/SP40000.2020.00045","DOI":"10.1109\/SP40000.2020.00045"},{"key":"617_CR19","doi-asserted-by":"publisher","unstructured":"Li, H., Xu, X., Zhang, X., Yang, S., Li, B.: Qeba: query-efficient boundary-based blackbox attack. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1218\u20131227 (2020). https:\/\/doi.org\/10.1109\/CVPR42600.2020.00130","DOI":"10.1109\/CVPR42600.2020.00130"},{"key":"617_CR20","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S.: Adversarial examples in the physical world. Preprint (2016). arXiv:1607.02533"},{"key":"617_CR21","doi-asserted-by":"publisher","unstructured":"Huang, Q., Katsman, I., Gu, Z., He, H., Belongie, S., Lim, S.-N.: Enhancing adversarial example transferability with an intermediate level attack. In: 2019 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 4732\u20134741 (2019). https:\/\/doi.org\/10.1109\/ICCV.2019.00483","DOI":"10.1109\/ICCV.2019.00483"},{"key":"617_CR22","unstructured":"Zhao, Z., Zhang, H., Li, R., Sicre, R., Amsaleg, L., Backes, M.: Towards good practices in evaluating transfer adversarial attacks. Preprint (2022). arXiv:2211.09565"},{"key":"617_CR23","doi-asserted-by":"publisher","unstructured":"Gong, C., Wang, D., Li, M., Chandra, V., Liu, Q.: Keepaugment: a simple information-preserving data augmentation approach. In: 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1055\u20131064 (2021). https:\/\/doi.org\/10.1109\/CVPR46437.2021.00111","DOI":"10.1109\/CVPR46437.2021.00111"},{"key":"617_CR24","doi-asserted-by":"publisher","unstructured":"Dabouei, A., Soleymani, S., Taherkhani, F., Nasrabadi, N.M.: Supermix: supervising the mixing data augmentation. In: 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 13789\u201313798 (2021). https:\/\/doi.org\/10.1109\/CVPR46437.2021.01358","DOI":"10.1109\/CVPR46437.2021.01358"},{"key":"617_CR25","doi-asserted-by":"publisher","unstructured":"Xie, C., Zhang, Z., Zhou, Y., Bai, S., Wang, J., Ren, Z., Yuille, A.L.: Improving transferability of adversarial examples with input diversity. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2725\u20132734 (2019). https:\/\/doi.org\/10.1109\/CVPR.2019.00284","DOI":"10.1109\/CVPR.2019.00284"},{"key":"617_CR26","doi-asserted-by":"publisher","unstructured":"Dong, Y., Pang, T., Su, H., Zhu, J.: Evading defenses to transferable adversarial examples by translation-invariant attacks. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4307\u20134316 (2019). https:\/\/doi.org\/10.1109\/CVPR.2019.00444","DOI":"10.1109\/CVPR.2019.00444"},{"key":"617_CR27","doi-asserted-by":"publisher","unstructured":"Wang, X., He, X., Wang, J., He, K.: Admix: enhancing the transferability of adversarial attacks. In: 2021 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 16138\u201316147 (2021). https:\/\/doi.org\/10.1109\/ICCV48922.2021.01585","DOI":"10.1109\/ICCV48922.2021.01585"},{"key":"617_CR28","doi-asserted-by":"crossref","unstructured":"Zhou, W., Hou, X., Chen, Y., Tang, M., Huang, X., Gan, X., Yang, Y.: Transferable adversarial perturbations. In: Computer Vision\u2014ECCV 2018, pp. 471\u2013486. Springer, London (2018)","DOI":"10.1007\/978-3-030-01264-9_28"},{"key":"617_CR29","doi-asserted-by":"publisher","unstructured":"Inkawhich, N., Wen, W., Li, H.H., Chen, Y.: Feature space perturbations yield more transferable adversarial examples. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 7059\u20137067 (2019). https:\/\/doi.org\/10.1109\/CVPR.2019.00723","DOI":"10.1109\/CVPR.2019.00723"},{"key":"617_CR30","doi-asserted-by":"publisher","unstructured":"Wang, Z., Guo, H., Zhang, Z., Liu, W., Qin, Z., Ren, K.: Feature importance-aware transferable adversarial attacks. In: 2021 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 7619\u20137628 (2021). https:\/\/doi.org\/10.1109\/ICCV48922.2021.00754","DOI":"10.1109\/ICCV48922.2021.00754"},{"key":"617_CR31","doi-asserted-by":"publisher","unstructured":"Zhang, J., Wu, W., Huang, J.-t., Huang, Y., Wang, W., Su, Y., Lyu, M.R.: Improving adversarial transferability via neuron attribution-based attacks. In: 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 14973\u201314982 (2022). https:\/\/doi.org\/10.1109\/CVPR52688.2022.01457","DOI":"10.1109\/CVPR52688.2022.01457"},{"key":"617_CR32","unstructured":"Wu, D., Wang, Y., Xia, S.-T., Bailey, J., Ma, X.: Skip connections matter: on the transferability of adversarial examples generated with ResNets. In: ICLR (2020)"},{"key":"617_CR33","doi-asserted-by":"publisher","unstructured":"Li, M., Deng, C., Li, T., Yan, J., Gao, X., Huang, H.: Towards transferable targeted attack. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 638\u2013646 (2020). https:\/\/doi.org\/10.1109\/CVPR42600.2020.00072","DOI":"10.1109\/CVPR42600.2020.00072"},{"key":"617_CR34","doi-asserted-by":"publisher","first-page":"1923","DOI":"10.1109\/LSP.2021.3112099","volume":"28","author":"H Hu","year":"2021","unstructured":"Hu, H., Lu, X., Zhang, X., Zhang, T., Sun, G.: Inheritance attention matrix-based universal adversarial perturbations on vision transformers. IEEE Signal Process. Lett. 28, 1923\u20131927 (2021). https:\/\/doi.org\/10.1109\/LSP.2021.3112099","journal-title":"IEEE Signal Process. Lett."},{"key":"617_CR35","doi-asserted-by":"crossref","unstructured":"Chung, J.S., Zisserman, A.: Out of time: automated lip sync in the wild. In: Computer Vision\u2014ACCV 2016 Workshops, pp. 251\u2013263 (2017)","DOI":"10.1007\/978-3-319-54427-4_19"},{"key":"617_CR36","doi-asserted-by":"crossref","unstructured":"van Hasselt, H., Guez, A., Silver, D.: Deep reinforcement learning with double $$q$$-learning. Preprint (2015). arXiv:1509.06461","DOI":"10.1609\/aaai.v30i1.10295"},{"key":"617_CR37","unstructured":"Weng, J., Luo, Z., Lin, D., Li, S., Zhong, Z.: Boosting adversarial transferability via fusing logits of top-1 decomposed feature. Preprint (2023). arXiv:2305.01361"},{"key":"617_CR38","unstructured":"Huang, G., Mattar, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Tech. Rep. (2008)"},{"key":"617_CR39","doi-asserted-by":"crossref","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: Proceedings of International Conference on Computer Vision (ICCV) (2015)","DOI":"10.1109\/ICCV.2015.425"},{"key":"617_CR40","unstructured":"Guo, J., Deng, J., Lattas, A., Zafeiriou, S.: Sample and computation redistribution for efficient face detection. Preprint (2021). arXiv:2105.04714"},{"key":"617_CR41","doi-asserted-by":"crossref","unstructured":"Wang, J., Liu, Y., Hu, Y., Shi, H., Mei, T.: Facex-zoo: a Pytorch toolbox for face recognition. Preprint (2021). arXiv:2101.04407v3","DOI":"10.1145\/3474085.3478324"},{"key":"617_CR42","doi-asserted-by":"crossref","unstructured":"Chen, S., Liu, Y., Gao, X., Han, Z.: Mobilefacenets: efficient CNNs for accurate real-time face verification on mobile devices. Preprint (2018). arXiv:1804.07573","DOI":"10.1007\/978-3-319-97909-0_46"},{"key":"617_CR43","doi-asserted-by":"publisher","unstructured":"Hu, J., Shen, L., Sun, G.: Squeeze-and-excitation networks. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7132\u20137141 (2018). https:\/\/doi.org\/10.1109\/CVPR.2018.00745","DOI":"10.1109\/CVPR.2018.00745"},{"issue":"10","key":"617_CR44","doi-asserted-by":"publisher","first-page":"5962","DOI":"10.1109\/TPAMI.2021.3087709","volume":"44","author":"J Deng","year":"2022","unstructured":"Deng, J., Guo, J., Yang, J., Xue, N., Kotsia, I., Zafeiriou, S.: Arcface: additive angular margin loss for deep face recognition. IEEE Trans. Pattern Anal. Mach. Intell. 44(10), 5962\u20135979 (2022). https:\/\/doi.org\/10.1109\/TPAMI.2021.3087709","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"617_CR45","doi-asserted-by":"publisher","unstructured":"Zhang, X., Zhao, R., Qiao, Y., Wang, X., Li, H.: Adacos: adaptively scaling cosine logits for effectively learning deep face representations. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 10815\u201310824 (2019). https:\/\/doi.org\/10.1109\/CVPR.2019.01108","DOI":"10.1109\/CVPR.2019.01108"},{"key":"617_CR46","doi-asserted-by":"crossref","unstructured":"Sun, Y., Cheng, C., Zhang, Y., Zhang, C., Zheng, L., Wang, Z., Wei, Y.: Circle loss: a unified perspective of pair similarity optimization. Preprint (2020). arXiv:2002.10857","DOI":"10.1109\/CVPR42600.2020.00643"},{"key":"617_CR47","doi-asserted-by":"publisher","unstructured":"Liu, H., Zhu, X., Lei, Z., Li, S.Z.: Adaptiveface: adaptive margin and sampling for face recognition. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 11939\u201311948 (2019). https:\/\/doi.org\/10.1109\/CVPR.2019.01222","DOI":"10.1109\/CVPR.2019.01222"},{"key":"617_CR48","doi-asserted-by":"publisher","unstructured":"Wang, X., Zhang, S., Wang, S., Fu, T., Shi, H., Mei, T.: Mis-classified vector guided softmax loss for face recognition. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 12241\u201312248 (2020). https:\/\/doi.org\/10.1609\/aaai.v34i07.6906","DOI":"10.1609\/aaai.v34i07.6906"},{"key":"617_CR49","doi-asserted-by":"publisher","unstructured":"Hu, Y.-C.-T., Chen, J.-C., Kung, B.-H., Hua, K.-L., Tan, D.S.: Naturalistic physical adversarial patch for object detectors. In: 2021 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 7828\u20137837 (2021). https:\/\/doi.org\/10.1109\/ICCV48922.2021.00775","DOI":"10.1109\/ICCV48922.2021.00775"},{"key":"617_CR50","unstructured":"Mark\u00a0Lee, Z.K.: On physical adversarial patches for object detection. Preprint (2019). arXiv:1906.11897"}],"container-title":["International Journal of Computational Intelligence Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-024-00617-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44196-024-00617-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-024-00617-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T03:53:00Z","timestamp":1724298780000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44196-024-00617-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,20]]},"references-count":50,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["617"],"URL":"https:\/\/doi.org\/10.1007\/s44196-024-00617-2","relation":{},"ISSN":["1875-6883"],"issn-type":[{"type":"electronic","value":"1875-6883"}],"subject":[],"published":{"date-parts":[[2024,8,20]]},"assertion":[{"value":"1 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"220"}}