{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:55:49Z","timestamp":1757310949585,"version":"3.37.3"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,23]]},"DOI":"10.1109\/icassp43922.2022.9746052","type":"proceedings-article","created":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T19:50:34Z","timestamp":1651089034000},"page":"2475-2479","source":"Crossref","is-referenced-by-count":1,"title":["SP Attack: Single-Perspective Attack for Generating Adversarial Omnidirectional Images"],"prefix":"10.1109","author":[{"given":"Yunjian","family":"Zhang","sequence":"first","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering"}]},{"given":"Yanwei","family":"Liu","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering"}]},{"given":"Jinxia","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang Wanli University"}]},{"given":"Pengwei","family":"Zhan","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering"}]},{"given":"Liming","family":"Wang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering"}]},{"given":"Zhen","family":"Xu","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00482"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.172"},{"key":"ref13","article-title":"A principled approach for generating adversarial images under non-smooth dissimilarity metrics","author":"pooladian","year":"2020","journal-title":"International Conference on Artificial Intelligence and Statistics"},{"article-title":"Adversarial patch","year":"2017","author":"brown","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68238-5_32"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/JPROC.2015.2494218","article-title":"Taking the human out of the loop: A review of bayesian optimization","volume":"104","author":"shahriari","year":"2015","journal-title":"Proceedings of the IEEE"},{"article-title":"Gaussian process optimization in the bandit setting: No regret and experimental design","year":"2009","author":"srinivas","key":"ref17"},{"key":"ref18","article-title":"3d shapenets: A deep representation for volumetric shapes","author":"wu","year":"2015","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10599-4_43"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01281"},{"key":"ref3","article-title":"Spherephd: Applying cnns on a spherical polyhedron representation of 360deg images","author":"lee","year":"2019","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01261-8_4"},{"key":"ref5","article-title":"Spherical cnns on unstructured grids","author":"jiang","year":"2019","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.153"},{"key":"ref7","article-title":"Spherical cnns","author":"cohen","year":"2018","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref2","article-title":"A deeper look at 3d shape classifiers","author":"su","year":"2018","journal-title":"Proceedings of the European Conference on Computer Vision (ECCV)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00935"},{"article-title":"Corners for layout: End-to-end layout recovery from 360 images","year":"2019","author":"fernandez-labrador","key":"ref9"},{"article-title":"Joint 2d-3d-semantic data for indoor scene understanding","year":"2017","author":"armeni","key":"ref20"}],"event":{"name":"ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2022,5,23]]},"location":"Singapore, Singapore","end":{"date-parts":[[2022,5,27]]}},"container-title":["ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9745891\/9746004\/09746052.pdf?arnumber=9746052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T20:09:43Z","timestamp":1661198983000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9746052\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,23]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icassp43922.2022.9746052","relation":{},"subject":[],"published":{"date-parts":[[2022,5,23]]}}}