{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T07:10:07Z","timestamp":1750749007403,"version":"3.41.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,5]]},"DOI":"10.1109\/cscwd64889.2025.11033503","type":"proceedings-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T17:24:40Z","timestamp":1750699480000},"page":"1646-1651","source":"Crossref","is-referenced-by-count":0,"title":["CBAT-ASG: Adversarial Sample Generation Method Based on CBA-Transformer"],"prefix":"10.1109","author":[{"given":"Lijuan","family":"Xu","sequence":"first","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science,Key Laboratory of Computing Power Network and Information Security, Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China"}]},{"given":"Zhiang","family":"Yao","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science,Key Laboratory of Computing Power Network and Information Security, Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China"}]},{"given":"Haoran","family":"Li","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science,Key Laboratory of Computing Power Network and Information Security, Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China"}]},{"given":"Chengcai","family":"Diao","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science,Key Laboratory of Computing Power Network and Information Security, Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China"}]},{"given":"Guangrun","family":"Zhou","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science,Key Laboratory of Computing Power Network and Information Security, Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China"}]},{"given":"Dawei","family":"Zhao","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science,Key Laboratory of Computing Power Network and Information Security, Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China"}]},{"given":"Hua","family":"Ding","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science,Key Laboratory of Computing Power Network and Information Security, Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan),Jinan,China"}]}],"member":"263","reference":[{"journal-title":"In-triguing properties of neural networks","year":"2013","author":"Szegedy","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427660"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264896"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00081"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00121"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.101"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3037500"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-023-05171-6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3290401"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1807.06521"},{"key":"ref13","article-title":"Pyraformer: Low-complexity pyramidal attention for long-range time series modeling and forecasting","volume-title":"International conference on learning representations","author":"Liu","year":"2021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.iswa.2023.200258"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/computers9030058"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2022.3188016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162699"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102717"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11590-022-01944-z"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10589-023-00522-y"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-023-01852-4"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.111089"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2021.100452"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)WR.1943-5452.0000983"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403392"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1061\/9780784480625.063"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103750"}],"event":{"name":"2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","start":{"date-parts":[[2025,5,5]]},"location":"Compiegne, France","end":{"date-parts":[[2025,5,7]]}},"container-title":["2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11033175\/11033221\/11033503.pdf?arnumber=11033503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:33:46Z","timestamp":1750746826000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11033503\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/cscwd64889.2025.11033503","relation":{},"subject":[],"published":{"date-parts":[[2025,5,5]]}}}