{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T05:34:34Z","timestamp":1773812074238,"version":"3.50.1"},"reference-count":44,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100018754","name":"Science and Technology Plan Projects of Tibet Autonomous Region","doi-asserted-by":"publisher","award":["XZ202501ZY0064"],"award-info":[{"award-number":["XZ202501ZY0064"]}],"id":[{"id":"10.13039\/501100018754","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013804","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100013804","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["YJ202326"],"award-info":[{"award-number":["YJ202326"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2 025ZYGXZR053"],"award-info":[{"award-number":["2 025ZYGXZR053"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012542","name":"Sichuan Provincial Science and Technology Support Program","doi-asserted-by":"publisher","award":["2024NSFSC1424"],"award-info":[{"award-number":["2024NSFSC1424"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202174"],"award-info":[{"award-number":["62202174"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62301346"],"award-info":[{"award-number":["62301346"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Pattern Recognition"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1016\/j.patcog.2025.112710","type":"journal-article","created":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T00:26:59Z","timestamp":1762561619000},"page":"112710","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"PD","title":["Beyond deceptive flatness: Dual-order solution for strengthening adversarial transferability"],"prefix":"10.1016","volume":"172","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3933-5401","authenticated-orcid":false,"given":"Zhixuan","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9769-8035","authenticated-orcid":false,"given":"Pingyu","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0762-9067","authenticated-orcid":false,"given":"Xingjian","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3555-0005","authenticated-orcid":false,"given":"Linbo","family":"Qing","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5378-6404","authenticated-orcid":false,"given":"Qi","family":"Liu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.patcog.2025.112710_bib0001","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2025.111652","article-title":"Cross-task and time-aware adversarial attack framework for perception of autonomous driving","volume":"165","author":"Lu","year":"2025","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2025.112710_bib0002","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2024.110915","article-title":"RADAP: a robust and adaptive defense against diverse adversarial patches on face recognition","volume":"157","author":"Liu","year":"2025","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2025.112710_bib0003","unstructured":"A. Madry, A. Makelov, L. Schmidt, D. Tsipras, A. Vladu, Towards deep learning models resistant to adversarial attacks, in: International Conference on Learning Representations, 2018."},{"key":"10.1016\/j.patcog.2025.112710_bib0004","series-title":"Artificial Intelligence Safety and Security","first-page":"99","article-title":"Adversarial examples in the physical world","author":"Kurakin","year":"2018"},{"key":"10.1016\/j.patcog.2025.112710_bib0005","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2024.111263","article-title":"Query-efficient black-box ensemble attack via dynamic surrogate weighting","volume":"161","author":"Hu","year":"2025","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2025.112710_bib0006","doi-asserted-by":"crossref","unstructured":"C. Xie, Z. Zhang, Y. Zhou, S. Bai, J. Wang, Z. Ren, A.L. Yuille, Improving transferability of adversarial examples with input diversity, in: IEEE Conference on Computer Vision and Pattern Recognition, 2019, pp. 2730\u20132739.","DOI":"10.1109\/CVPR.2019.00284"},{"key":"10.1016\/j.patcog.2025.112710_bib0007","unstructured":"J. Lin, C. Song, K. He, L. Wang, J.E. Hopcroft, Nesterov accelerated gradient and scale invariance for adversarial attacks, in: International Conference on Learning Representations, 2020."},{"key":"10.1016\/j.patcog.2025.112710_bib0008","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"4312","article-title":"Evading defenses to transferable adversarial examples by translation-invariant attacks","author":"Dong","year":"2019"},{"key":"10.1016\/j.patcog.2025.112710_bib0009","series-title":"IEEE\/CVF International Conference on Computer Vision","first-page":"16138","article-title":"Admix: enhancing the transferability of adversarial attacks","author":"Wang","year":"2021"},{"key":"10.1016\/j.patcog.2025.112710_bib0010","series-title":"Proceedings of the European Conference on Computer Vision (ECCV)","first-page":"549","article-title":"Frequency domain model augmentation for adversarial attack","volume":"13664","author":"Long","year":"2022"},{"key":"10.1016\/j.patcog.2025.112710_bib0011","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"9185","article-title":"Boosting adversarial attacks with momentum","author":"Dong","year":"2018"},{"key":"10.1016\/j.patcog.2025.112710_bib0012","series-title":"Advances in Neural Information Processing Systems","article-title":"Boosting the transferability of adversarial attacks with reverse adversarial perturbation","author":"Qin","year":"2022"},{"key":"10.1016\/j.patcog.2025.112710_bib0013","article-title":"Enhancing adversarial transferability through neighborhood conditional sampling","volume":"abs\/2405.16181","author":"Qiu","year":"2024","journal-title":"CoRR"},{"key":"10.1016\/j.patcog.2025.112710_bib0014","series-title":"Advances in Neural Information Processing Systems","article-title":"Boosting adversarial transferability by achieving flat local maxima","author":"Ge","year":"2023"},{"key":"10.1016\/j.patcog.2025.112710_bib0015","series-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"21248","article-title":"ProjAttacker: a configurable physical adversarial attack for face recognition via projector","author":"Liu","year":"2025"},{"key":"10.1016\/j.patcog.2025.112710_bib0016","series-title":"International Conference on Learning Representations","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2015"},{"key":"10.1016\/j.patcog.2025.112710_bib0017","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"1924","article-title":"Enhancing the transferability of adversarial attacks through variance tuning","author":"Wang","year":"2021"},{"key":"10.1016\/j.patcog.2025.112710_bib0018","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.124757","article-title":"Boosting the transferability of adversarial attacks with global momentum initialization","volume":"255","author":"Wang","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.patcog.2025.112710_bib0019","series-title":"Proceedings of the ACM International Conference on Information and Knowledge Management","first-page":"2410","article-title":"Improving adversarial transferability via frequency-guided sample relevance attack","author":"Wang","year":"2024"},{"key":"10.1016\/j.patcog.2025.112710_bib0020","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"6731","article-title":"Improving integrated gradient-based transferable adversarial examples by refining the integration path","author":"Ren","year":"2025"},{"key":"10.1016\/j.patcog.2025.112710_bib0021","unstructured":"H. Zhang, M. Ciss\u00e9, Y.N. Dauphin, D. Lopez-Paz, mixup: beyond Empirical risk minimization, in: International Conference on Learning Representations, 2018."},{"key":"10.1016\/j.patcog.2025.112710_bib0022","doi-asserted-by":"crossref","first-page":"7633","DOI":"10.1109\/TIFS.2024.3430508","article-title":"Enhancing transferability of adversarial examples through mixed-frequency inputs","volume":"19","author":"Qian","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.patcog.2025.112710_bib0023","series-title":"International Conference on Learning Representations","article-title":"Ensemble adversarial training: attacks and defenses","author":"Tram\u00e8r","year":"2018"},{"issue":"6","key":"10.1016\/j.patcog.2025.112710_bib0024","doi-asserted-by":"crossref","first-page":"4330","DOI":"10.1109\/TPAMI.2025.3540200","article-title":"Improving adversarial training from the perspective of class-Flipping distribution","volume":"47","author":"Zhou","year":"2025","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.patcog.2025.112710_bib0025","series-title":"Annual Conference on Neural Information Processing Systems","article-title":"Adversarial weight perturbation helps robust generalization","author":"Wu","year":"2020"},{"key":"10.1016\/j.patcog.2025.112710_bib0026","series-title":"International Conference on Machine Learning","first-page":"1310","article-title":"Certified adversarial robustness via randomized smoothing","volume":"97","author":"Cohen","year":"2019"},{"key":"10.1016\/j.patcog.2025.112710_bib0027","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"1778","article-title":"Defense against adversarial attacks using high-Level representation guided denoiser","author":"Liao","year":"2018"},{"key":"10.1016\/j.patcog.2025.112710_bib0028","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"501","article-title":"Feature denoising for improving adversarial robustness","author":"Xie","year":"2019"},{"key":"10.1016\/j.patcog.2025.112710_bib0029","series-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"259","article-title":"A self-supervised approach for adversarial robustness","author":"Naseer","year":"2020"},{"key":"10.1016\/j.patcog.2025.112710_bib0030","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"6084","article-title":"ComDefend: an efficient image compression model to defend adversarial examples","author":"Jia","year":"2019"},{"key":"10.1016\/j.patcog.2025.112710_bib0031","series-title":"International Conference on Learning Representations","article-title":"Countering adversarial images using input transformations","author":"Guo","year":"2018"},{"key":"10.1016\/j.patcog.2025.112710_bib0032","series-title":"Annual Network and Distributed System Security Symposium","article-title":"Feature squeezing: detecting adversarial examples in deep neural networks","author":"Xu","year":"2018"},{"key":"10.1016\/j.patcog.2025.112710_bib0033","unstructured":"C. Xie, J. Wang, Z. Zhang, Z. Ren, A.L. Yuille, Mitigating adversarial effects through randomization, in: International Conference on Learning Representations, 2018."},{"issue":"9","key":"10.1016\/j.patcog.2025.112710_bib0034","doi-asserted-by":"crossref","first-page":"5920","DOI":"10.1007\/s11263-025-02467-7","article-title":"Defending against adversarial examples via modeling adversarial noise","volume":"133","author":"Zhou","year":"2025","journal-title":"Int. J. Comput. Vis."},{"key":"10.1016\/j.patcog.2025.112710_bib0035","series-title":"International Conference on Learning Representations","article-title":"Sharpness-aware minimization for efficiently improving generalization","author":"Foret","year":"2021"},{"key":"10.1016\/j.patcog.2025.112710_bib0036","series-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"20247","article-title":"Gradient norm aware minimization seeks first-Order flatness and improves generalization","author":"Zhang","year":"2023"},{"key":"10.1016\/j.patcog.2025.112710_bib0037","series-title":"IEEE\/CVF International Conference on Computer Vision","first-page":"5166","article-title":"Flatness-aware minimization for domain generalization","author":"Zhang","year":"2023"},{"key":"10.1016\/j.patcog.2025.112710_bib0038","doi-asserted-by":"crossref","unstructured":"X. Zhang, Y. He, R. Xu, H. Yu, Z. Shen, P. Cui, NICO++: towards better benchmarking for domain generalization, in: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2023c, pp. 16036\u201316047.","DOI":"10.1109\/CVPR52729.2023.01539"},{"key":"10.1016\/j.patcog.2025.112710_bib0039","series-title":"Conference on Learning Theory","article-title":"Domain adaptation: learning bounds and algorithms","author":"Mansour","year":"2009"},{"key":"10.1016\/j.patcog.2025.112710_bib0040","first-page":"1","article-title":"A survey of optimization methods for training DL models: theoretical perspective on convergence and generalization","volume":"abs\/2501.14458","author":"Wang","year":"2025","journal-title":"CoRR"},{"issue":"1\u20133","key":"10.1016\/j.patcog.2025.112710_bib0041","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1023\/A:1018012322525","article-title":"Reinforcement learning with replacing eligibility traces","volume":"22","author":"Singh","year":"1996","journal-title":"Mach. Learn."},{"key":"10.1016\/j.patcog.2025.112710_bib0042","series-title":"2024 International Conference on Circuit, Systems and Communication (ICCSC)","first-page":"1","article-title":"A survey on RGB images classification using convolutional neural network (CNN) architectures: applications and challenges","author":"Khayya","year":"2024"},{"key":"10.1016\/j.patcog.2025.112710_bib0043","series-title":"Proceedings of the European Conference on Computer Vision","first-page":"19","article-title":"Progressive neural architecture search","volume":"11205","author":"Liu","year":"2018"},{"key":"10.1016\/j.patcog.2025.112710_bib0044","doi-asserted-by":"crossref","first-page":"95496","DOI":"10.1109\/ACCESS.2025.3571735","article-title":"Transformers for vision: a survey on innovative methods for computer vision","volume":"13","author":"Palanisamy","year":"2025","journal-title":"IEEE Access"}],"container-title":["Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0031320325013731?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0031320325013731?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T04:56:22Z","timestamp":1773809782000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0031320325013731"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4]]},"references-count":44,"alternative-id":["S0031320325013731"],"URL":"https:\/\/doi.org\/10.1016\/j.patcog.2025.112710","relation":{},"ISSN":["0031-3203"],"issn-type":[{"value":"0031-3203","type":"print"}],"subject":[],"published":{"date-parts":[[2026,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Beyond deceptive flatness: Dual-order solution for strengthening adversarial transferability","name":"articletitle","label":"Article Title"},{"value":"Pattern Recognition","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.patcog.2025.112710","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"112710"}}