{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T09:31:17Z","timestamp":1775899877955,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/icassp40776.2020.9053574","type":"proceedings-article","created":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T20:21:13Z","timestamp":1586463673000},"page":"2897-2901","source":"Crossref","is-referenced-by-count":20,"title":["Hijacking Tracker: A Powerful Adversarial Attack on Visual Tracking"],"prefix":"10.1109","author":[{"given":"Xiyu","family":"Yan","sequence":"first","affiliation":[]},{"given":"Xuesong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Shu-Tao","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref12","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014"},{"key":"ref13","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00723"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011028"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"ref18","article-title":"Practical adversarial attack against object detector","author":"zhao","year":"2018"},{"key":"ref19","article-title":"Fooling detection alone is not enough: First adversarial attack against multiple object tracking","author":"jia","year":"2019"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00441"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.378"},{"key":"ref6","article-title":"The sixth visual object tracking vot2018 challenge results","author":"kristan","year":"2018","journal-title":"Proc Of the European Conference on Computer Vision (ECCV)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2388226"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00552"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46448-0_27"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00935"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01246-5_19"},{"key":"ref1","first-page":"850","article-title":"Fully-convolutional siamese networks for object tracking","author":"bertinetto","year":"2016","journal-title":"Proc Of the European Conference on Computer Vision (ECCV)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00479"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.690"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46448-0_45"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00492"},{"key":"ref26","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014"},{"key":"ref25","first-page":"83","article-title":"Real-time mdnet","author":"jung","year":"2018","journal-title":"Proc Of the European Conference on Computer Vision (ECCV)"}],"event":{"name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Barcelona, Spain","start":{"date-parts":[[2020,5,4]]},"end":{"date-parts":[[2020,5,8]]}},"container-title":["ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9040208\/9052899\/09053574.pdf?arnumber=9053574","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:28:05Z","timestamp":1656376085000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9053574\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icassp40776.2020.9053574","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}