{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T23:01:10Z","timestamp":1752102070562},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T00:00:00Z","timestamp":1637020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T00:00:00Z","timestamp":1637020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T00:00:00Z","timestamp":1637020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,16]]},"DOI":"10.1109\/avss52988.2021.9663769","type":"proceedings-article","created":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T15:43:05Z","timestamp":1641397385000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["MultAV: Multiplicative Adversarial Videos"],"prefix":"10.1109","author":[{"given":"Shao-Yuan","family":"Lo","sequence":"first","affiliation":[]},{"given":"Vishal M.","family":"Patel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Defending against multiple and unforeseen adversarial videos","year":"2020","author":"lo","key":"ref10"},{"key":"ref11","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2018","journal-title":"International Conference on Learning Representations"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref13","article-title":"Ucf101: A dataset of 101 human actions classes from videos in the wild","author":"soomro","year":"2012","journal-title":"arXiv preprint arXiv 1212 0402"},{"key":"ref14","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"International Conference on Learning Representations"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33018973"},{"key":"ref16","article-title":"Defending against physically realizable attacks on image classification","author":"wu","year":"2020","journal-title":"International Conference on Learning Representations"},{"key":"ref17","article-title":"Spatially transformed adversarial examples","author":"xiao","year":"2018","journal-title":"International Conference on Learning Representations"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00059"},{"key":"ref19","article-title":"Learning with multiplicative perturbations","author":"yang","year":"2020","journal-title":"International Conference on Pattern Recognition"},{"key":"ref4","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"International Conference on Learning Representations"},{"journal-title":"Speckle Phenomena in Optics Theory and Applications","year":"2008","author":"freund","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00685"},{"key":"ref8","article-title":"Functional adversarial attacks","author":"laidlaw","year":"2019","journal-title":"Conference on Neural Information Processing Systems"},{"key":"ref7","article-title":"Blackbox adversarial attacks on video recognition models","author":"jiang","year":"2019","journal-title":"ACM international conference on Multimedia"},{"key":"ref2","article-title":"Exploring the landscape of spatial robustness","author":"engstrom","year":"2019","journal-title":"International Conference on Machine Learning"},{"key":"ref1","article-title":"Adversarial patch","author":"brown","year":"2017","journal-title":"Conference and Workshop on Neural Information Processing Systems Workshop"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23202"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.330110077"}],"event":{"name":"2021 17th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)","start":{"date-parts":[[2021,11,16]]},"location":"Washington, DC, USA","end":{"date-parts":[[2021,11,19]]}},"container-title":["2021 17th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9663572\/9663735\/09663769.pdf?arnumber=9663769","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:56:51Z","timestamp":1652187411000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9663769\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,16]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/avss52988.2021.9663769","relation":{},"subject":[],"published":{"date-parts":[[2021,11,16]]}}}