{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:12:08Z","timestamp":1754154728623,"version":"3.41.2"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Erasmus Mundus Joint Master Degree (EMJMD) master\u2019s programme in Engineering of Data-Intensive Intelligent Software Systems"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3589512","type":"journal-article","created":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T17:43:25Z","timestamp":1752601405000},"page":"126444-126464","source":"Crossref","is-referenced-by-count":0,"title":["Investigating the Transferability of TOG Adversarial Attacks in YOLO Models in the Maritime Domain"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-2532-4164","authenticated-orcid":false,"given":"Phornphawit","family":"Manasut","sequence":"first","affiliation":[{"name":"Department of Information Technology, &#x00C5;bo Akademi University, Turku, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7779-3884","authenticated-orcid":false,"given":"Md Saleh","family":"Ibtasham","sequence":"additional","affiliation":[{"name":"Department of Information Technology, &#x00C5;bo Akademi University, Turku, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0674-6738","authenticated-orcid":false,"given":"Zeynep","family":"Yaradanakul","sequence":"additional","affiliation":[{"name":"Department of Information Technology, &#x00C5;bo Akademi University, Turku, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4739-9560","authenticated-orcid":false,"given":"Sepinoud","family":"Azimi","sequence":"additional","affiliation":[{"name":"Department of Technology, Policy and Management, Delft University of Technology, Delft, CD, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5286-5343","authenticated-orcid":false,"given":"S\u00e9bastien","family":"Lafond","sequence":"additional","affiliation":[{"name":"Department of Information Technology, &#x00C5;bo Akademi University, Turku, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8801-7250","authenticated-orcid":false,"given":"Bogdan","family":"Iancu","sequence":"additional","affiliation":[{"name":"Department of Information Technology, &#x00C5;bo Akademi University, Turku, Finland"}]}],"member":"263","reference":[{"volume-title":"Ultralytics YOLO","year":"2024","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS48705.2020.9074315"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3127960"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-022-02660-6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2004.10934"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12028"},{"key":"ref8","article-title":"TOG: Targeted adversarial objectness gradient attacks on real-time object detection systems","author":"Chow","year":"2020","journal-title":"arXiv:2004.04320"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59013-0_23"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA50397.2020.00042"},{"key":"ref11","article-title":"A study of the effect of JPG compression on adversarial images","author":"Dziugaite","year":"2016","journal-title":"arXiv:1608.00853"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-009-0275-4"},{"key":"ref13","first-page":"209","article-title":"Object tracking using VOC tracker and R-CNN","volume-title":"Proc. Bioimaging","author":"Farkhodov"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"article-title":"Object detection in maritime environments","year":"2019","author":"Grini","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2018.8569890"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/rs13050988"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/jmse11091638"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2025.01604106"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00624"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.01.135"},{"article-title":"Ultralytics\/YOLOv5: V7. 0-YOLOv5 SOTA realtime instance segmentation","year":"2022","author":"Jocher","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/jmse10030377"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref25","article-title":"Adversarial machine learning at scale","author":"Kurakin","year":"2016","journal-title":"arXiv:1611.01236"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01264-9_45"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/jmse11050947"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/jmse11061179"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00035"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/s22155817"},{"key":"ref32","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3138338"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2964608"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3389\/fmars.2023.1112955"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/su14010198"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3049238"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2634580"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.690"},{"key":"ref42","article-title":"YOLOv3: An incremental improvement","author":"Redmon","year":"2018","journal-title":"arXiv:1804.02767"},{"key":"ref43","first-page":"91","article-title":"Faster R-CNN: Towards real-time object detection with region proposal networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"28","author":"Ren"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3018698"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3398394"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2865686"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-024-02103-w"},{"key":"ref48","first-page":"1","article-title":"Physical adversarial examples for object detectors","volume-title":"Proc. 12th USENIX Workshop Offensive Technol. (WOOT 18)","author":"Song"},{"key":"ref49","first-page":"38","article-title":"An empirical study on cross-data transferability of adversarial attacks on object detectors","volume-title":"Proc. AI-Cybersec@ SGAI","author":"Staff"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3357082"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.5772\/acrt.15"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3390\/make5040083"},{"key":"ref53","first-page":"1633","article-title":"On adaptive attacks to adversarial example defenses","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Tram\u00e8r"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s00773-020-00790-x"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01283"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102634"},{"article-title":"Understanding and enhancing the transferability of adversarial examples","year":"2018","author":"Wu","key":"ref57"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2022.103514"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107388"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00169-7"},{"key":"ref61","article-title":"Objects as points","author":"Zhou","year":"2019","journal-title":"arXiv:1904.07850"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2023.3238524"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11080415.pdf?arnumber=11080415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T17:57:18Z","timestamp":1753379838000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11080415\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3589512","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}