{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T11:26:20Z","timestamp":1776165980414,"version":"3.50.1"},"reference-count":55,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,11,1]],"date-time":"2026-11-01T00:00:00Z","timestamp":1793491200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,11,1]],"date-time":"2026-11-01T00:00:00Z","timestamp":1793491200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,11,1]],"date-time":"2026-11-01T00:00:00Z","timestamp":1793491200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,11,1]],"date-time":"2026-11-01T00:00:00Z","timestamp":1793491200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,11,1]],"date-time":"2026-11-01T00:00:00Z","timestamp":1793491200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,11,1]],"date-time":"2026-11-01T00:00:00Z","timestamp":1793491200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,11,1]],"date-time":"2026-11-01T00:00:00Z","timestamp":1793491200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62371450"],"award-info":[{"award-number":["62371450"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Pattern Recognition"],"published-print":{"date-parts":[[2026,11]]},"DOI":"10.1016\/j.patcog.2026.113490","type":"journal-article","created":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T23:30:36Z","timestamp":1774135836000},"page":"113490","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"PA","title":["Sparse adversarial attack via robust attack points selection"],"prefix":"10.1016","volume":"179","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-9992-1621","authenticated-orcid":false,"given":"Yunjian","family":"Zhang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0626-1901","authenticated-orcid":false,"given":"Yanwei","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7468-0622","authenticated-orcid":false,"given":"Jianing","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1216-3041","authenticated-orcid":false,"given":"Enci","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0991-1970","authenticated-orcid":false,"given":"Yao","family":"Zhu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2510-3124","authenticated-orcid":false,"given":"Antonios","family":"Argyriou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.patcog.2026.113490_bib0001","series-title":"Neural Information Processing Systems (NIPS)","first-page":"529","article-title":"Learning spherical convolution for fast features from 360\u2218 imagery","author":"Su","year":"2017"},{"key":"10.1016\/j.patcog.2026.113490_bib0002","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2025.111429","article-title":"Max360IQ: blind omnidirectional image quality assessment with multi-axis attention","volume":"162","author":"Yan","year":"2025","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2026.113490_bib0003","doi-asserted-by":"crossref","first-page":"1326","DOI":"10.1109\/TIP.2025.3539468","article-title":"Omnidirectional image quality captioning: a large-scale database and a new model","volume":"34","author":"Yan","year":"2025","journal-title":"IEEE Trans. Image Process. (TIP)"},{"key":"10.1016\/j.patcog.2026.113490_bib0004","series-title":"IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)","first-page":"109","article-title":"Realistic training in VR using physical manipulation","author":"Villegas","year":"2020"},{"key":"10.1016\/j.patcog.2026.113490_bib0005","series-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV)","first-page":"373","article-title":"360BEV: panoramic semantic mapping for indoor bird\u2019s-eye view","author":"Teng","year":"2024"},{"key":"10.1016\/j.patcog.2026.113490_bib0006","series-title":"ACM Symposium on User Interface Software and Technology","first-page":"33","article-title":"Omnieyeball: spherical display equipped with omnidirectional camera and its application for 360-degree video communication","author":"Li","year":"2018"},{"key":"10.1016\/j.patcog.2026.113490_bib0007","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1007\/s11263-019-01220-1","article-title":"Learning SO(3) equivariant representations with spherical CNNs","volume":"128","author":"Esteves","year":"2019","journal-title":"Int. J. Comput. Vision (IJCV)"},{"key":"10.1016\/j.patcog.2026.113490_bib0008","series-title":"International Conference on Learning Representations (ICLR)","first-page":"1","article-title":"Spherical CNNs","author":"Cohen","year":"2018"},{"key":"10.1016\/j.patcog.2026.113490_bib0009","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"9442","article-title":"Kernel transformer networks for compact spherical convolution","author":"Su","year":"2018"},{"key":"10.1016\/j.patcog.2026.113490_bib0010","series-title":"International Conference on Learning Representations (ICLR)","first-page":"1","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2014"},{"key":"10.1016\/j.patcog.2026.113490_bib0011","doi-asserted-by":"crossref","first-page":"2046","DOI":"10.1109\/TIFS.2023.3262156","article-title":"Information-containing adversarial perturbation for combating facial manipulation systems","volume":"18","author":"Zhu","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur. (TIFS)"},{"key":"10.1016\/j.patcog.2026.113490_bib0012","doi-asserted-by":"crossref","first-page":"3561","DOI":"10.1109\/TIFS.2023.3284649","article-title":"Logit margin matters: improving transferable targeted adversarial attack by logit calibration","volume":"18","author":"Weng","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur. (TIFS)"},{"key":"10.1016\/j.patcog.2026.113490_bib0013","article-title":"RADAP: a robust and adaptive defense against diverse adversarial patches on face recognition","volume":"157","author":"Liu","year":"2024","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2026.113490_bib0014","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2024.110252","article-title":"AdvOps: decoupling adversarial examples","volume":"149","author":"Wang","year":"2024","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2026.113490_bib0015","doi-asserted-by":"crossref","first-page":"6471","DOI":"10.1109\/TMM.2022.3209015","article-title":"View-aware salient object detection for 360\u2218 omnidirectional image","volume":"25","author":"Wu","year":"2022","journal-title":"IEEE Trans. Multimed. (TMM)"},{"key":"10.1016\/j.patcog.2026.113490_bib0016","doi-asserted-by":"crossref","first-page":"9777","DOI":"10.1109\/TII.2022.3216812","article-title":"PSTile: perception-Sensitivity-Based 360\u2218 tiled video streaming for industrial surveillance","volume":"19","author":"Tu","year":"2023","journal-title":"IEEE Trans. Ind. Inf. (TII)"},{"key":"10.1016\/j.patcog.2026.113490_bib0017","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"15035","article-title":"360-Attack: distortion-aware perturbations from perspective-views","author":"Zhang","year":"2022"},{"key":"10.1016\/j.patcog.2026.113490_bib0018","series-title":"IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"2475","article-title":"SP attack: single-perspective attack for generating adversarial omnidirectional images","author":"Zhang","year":"2022"},{"key":"10.1016\/j.patcog.2026.113490_bib0019","series-title":"IEEE European Symposium on Security and Privacy (EuroS&P)","first-page":"372","article-title":"The limitations of deep learning in adversarial settings","author":"Papernot","year":"2015"},{"key":"10.1016\/j.patcog.2026.113490_bib0020","series-title":"IEEE International Conference on Data Mining (ICDM)","first-page":"301","article-title":"A unified gradient regularization family for adversarial examples","author":"Lyu","year":"2015"},{"key":"10.1016\/j.patcog.2026.113490_bib0021","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV)","first-page":"4724","article-title":"Sparse and imperceivable adversarial attacks","author":"Croce","year":"2019"},{"key":"10.1016\/j.patcog.2026.113490_bib0022","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","article-title":"One pixel attack for fooling deep neural networks","volume":"23","author":"Su","year":"2017","journal-title":"IEEE Trans. Evol. Computat. (TEC)"},{"key":"10.1016\/j.patcog.2026.113490_bib0023","series-title":"Proceedings of the European Conference on Computer Vision (ECCV)","first-page":"35","article-title":"Sparse adversarial attack via perturbation factorization","author":"Fan","year":"2020"},{"key":"10.1016\/j.patcog.2026.113490_bib0024","series-title":"Neural Information Processing Systems (NIPS)","first-page":"11226","article-title":"GreedyFool: distortion-aware sparse adversarial attack","author":"Dong","year":"2020"},{"key":"10.1016\/j.patcog.2026.113490_bib0025","series-title":"Proceedings of the European Conference on Computer Vision (ECCV)","first-page":"488","article-title":"Saliency detection in 360\u2218 videos","author":"Zhang","year":"2018"},{"key":"10.1016\/j.patcog.2026.113490_bib0026","series-title":"International Conference on Learning Representations (ICLR)","first-page":"1","article-title":"Spherical CNNs on unstructured grids","author":"Jiang","year":"2019"},{"key":"10.1016\/j.patcog.2026.113490_bib0027","doi-asserted-by":"crossref","first-page":"1255","DOI":"10.1109\/LRA.2020.2967274","article-title":"Corners for layout: end-to-end layout recovery from 360\u2218 images","volume":"5","author":"Fernandez-Labrador","year":"2019","journal-title":"IEEE Rob. Autom. Lett. (RAL)"},{"key":"10.1016\/j.patcog.2026.113490_bib0028","series-title":"Proceedings of the European Conference on Computer Vision (ECCV)","first-page":"518","article-title":"SphereNet: learning spherical representations for detection and classification in omnidirectional images","author":"Coors","year":"2018"},{"key":"10.1016\/j.patcog.2026.113490_bib0029","series-title":"Proceedings of the European Conference on Computer Vision (ECCV)","first-page":"707","article-title":"Distortion-aware convolutional filters for dense prediction in panoramic images","author":"Tateno","year":"2018"},{"key":"10.1016\/j.patcog.2026.113490_bib0030","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"12426","article-title":"Tangent images for mitigating spherical distortion","author":"Eder","year":"2019"},{"key":"10.1016\/j.patcog.2026.113490_bib0031","series-title":"International Conference on Learning Representations (ICLR)","first-page":"1","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2015"},{"key":"10.1016\/j.patcog.2026.113490_bib0032","series-title":"International Conference on Learning Representations (ICLR)","first-page":"1","article-title":"Adversarial examples in the physical world","author":"Kurakin","year":"2017"},{"key":"10.1016\/j.patcog.2026.113490_bib0033","series-title":"International Conference on Learning Representations (ICLR)","first-page":"1","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2018"},{"key":"10.1016\/j.patcog.2026.113490_bib0034","series-title":"International Conference on Learning Representations (ICLR)","first-page":"1","article-title":"Rethinking adversarial transferability from a data distribution perspective","author":"Zhu","year":"2022"},{"key":"10.1016\/j.patcog.2026.113490_bib0035","doi-asserted-by":"crossref","first-page":"6487","DOI":"10.1109\/TIP.2022.3211736","article-title":"Toward understanding and boosting adversarial transferability from a distribution perspective","volume":"31","author":"Zhu","year":"2022","journal-title":"IEEE Trans. Image Process. (TIP)"},{"key":"10.1016\/j.patcog.2026.113490_bib0036","series-title":"Proceedings of the International Conference on Machine Learning (ICML)","first-page":"12868","article-title":"Sparse and imperceptible adversarial attack via a homotopy algorithm","author":"Zhu","year":"2021"},{"key":"10.1016\/j.patcog.2026.113490_bib0037","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"12291","article-title":"Black-box sparse adversarial attack via multi-objective optimisation","author":"Williams","year":"2023"},{"key":"10.1016\/j.patcog.2026.113490_bib0038","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"9087","article-title":"SparseFool: a few pixels make a big difference","author":"Modas","year":"2018"},{"key":"10.1016\/j.patcog.2026.113490_bib0039","series-title":"Proceedings of the ACM International Conference on Multimedia (MM)","first-page":"1065","article-title":"An ADMM-based universal framework for adversarial attacks on deep neural networks","author":"Zhao","year":"2018"},{"key":"10.1016\/j.patcog.2026.113490_bib0040","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence (AAAI)","first-page":"6437","article-title":"Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacks","volume":"36","author":"Croce","year":"2022"},{"key":"10.1016\/j.patcog.2026.113490_bib0041","series-title":"Proceedings of the International Conference on Machine Learning (ICML)","first-page":"950","article-title":"Fast differentiable sorting and ranking","author":"Blondel","year":"2020"},{"key":"10.1016\/j.patcog.2026.113490_bib0042","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He","year":"2015"},{"key":"10.1016\/j.patcog.2026.113490_bib0043","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1287\/mnsc.34.5.633","article-title":"A new algorithm for the 0\u20131 knapsack problem","volume":"34","author":"Martello","year":"1988","journal-title":"Manag. Sci."},{"key":"10.1016\/j.patcog.2026.113490_bib0044","doi-asserted-by":"crossref","first-page":"1695","DOI":"10.1109\/TPAMI.2018.2845842","article-title":"lp-Box ADMM: a versatile framework for integer programming","volume":"41","author":"Wu","year":"2016","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell. (TPAMI)"},{"key":"10.1016\/j.patcog.2026.113490_bib0045","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/2200000016","article-title":"Distributed optimization and statistical learning via the alternating direction method of multipliers","volume":"3","author":"Boyd","year":"2011","journal-title":"Found. Trends Mach. Learn."},{"key":"10.1016\/j.patcog.2026.113490_bib0046","doi-asserted-by":"crossref","first-page":"2552","DOI":"10.1109\/TIP.2023.3270032","article-title":"Perspectively equivariant keypoint learning for omnidirectional images","volume":"32","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Image Process. (TIP)"},{"key":"10.1016\/j.patcog.2026.113490_bib0047","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"248","article-title":"ImageNet: a large-scale hierarchical image database","author":"Deng","year":"2009"},{"key":"10.1016\/j.patcog.2026.113490_bib0048","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"11976","article-title":"A ConvNet for the 2020s","author":"Liu","year":"2022"},{"key":"10.1016\/j.patcog.2026.113490_bib0049","series-title":"Neural Information Processing Systems (NIPS)","first-page":"9355","article-title":"Twins: revisiting the design of spatial attention in vision transformers","author":"Chu","year":"2021"},{"key":"10.1016\/j.patcog.2026.113490_bib0050","series-title":"Proceedings of the International Conference on Machine Learning (ICML)","first-page":"2286","article-title":"ConViT: improving vision transformers with soft convolutional inductive biases","author":"d\u2019Ascoli","year":"2021"},{"key":"10.1016\/j.patcog.2026.113490_bib0051","first-page":"1","article-title":"Adversarial attacks defense method based on multiple filtering and image rotation","volume":"2022","author":"Li","year":"2022","journal-title":"Discrete Dyn. Nat. Soc."},{"key":"10.1016\/j.patcog.2026.113490_bib0052","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"1912","article-title":"3D ShapeNets: a deep representation for volumetric shapes","author":"Wu","year":"2015"},{"key":"10.1016\/j.patcog.2026.113490_bib0053","series-title":"Proceedings of the European Conference on Computer Vision (ECCV)","first-page":"668","article-title":"PanoContext: a whole-room 3D context model for panoramic scene understanding","author":"Zhang","year":"2014"},{"key":"10.1016\/j.patcog.2026.113490_bib0054","unstructured":"I. Armeni, S. Sax, A. Zamir, S. Savarese, Joint 2D-3D-semantic data for indoor scene understanding, (2017). arXiv:abs\/1702.01105."},{"key":"10.1016\/j.patcog.2026.113490_bib0055","doi-asserted-by":"crossref","first-page":"14665","DOI":"10.1109\/TPAMI.2023.3307152","article-title":"HexNet: an orientation-aware deep learning framework for omni-directional input","volume":"45","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell. (TPAMI)"}],"container-title":["Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0031320326004565?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0031320326004565?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T10:04:38Z","timestamp":1776161078000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0031320326004565"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,11]]},"references-count":55,"alternative-id":["S0031320326004565"],"URL":"https:\/\/doi.org\/10.1016\/j.patcog.2026.113490","relation":{},"ISSN":["0031-3203"],"issn-type":[{"value":"0031-3203","type":"print"}],"subject":[],"published":{"date-parts":[[2026,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Sparse adversarial attack via robust attack points selection","name":"articletitle","label":"Article Title"},{"value":"Pattern Recognition","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.patcog.2026.113490","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"113490"}}