{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T06:30:08Z","timestamp":1774420208629,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,6]]},"DOI":"10.1109\/icassp49660.2025.10888268","type":"proceedings-article","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T17:15:19Z","timestamp":1741799719000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Improving Adversarial Transferability through Channel-wise Scaling and Frequency-random Dropping"],"prefix":"10.1109","author":[{"given":"Pei","family":"Chen","sequence":"first","affiliation":[{"name":"Tianjin University,College of Intelligence and Computing,Tianjin,China"}]},{"given":"Zhiyong","family":"Feng","sequence":"additional","affiliation":[{"name":"Tianjin University,College of Intelligence and Computing,Tianjin,China"}]},{"given":"Meng","family":"Xing","sequence":"additional","affiliation":[{"name":"Tianjin University,College of Intelligence and Computing,Tianjin,China"}]},{"given":"Yiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tianjin University,College of Intelligence and Computing,Tianjin,China"}]},{"given":"Jinqing","family":"Zheng","sequence":"additional","affiliation":[{"name":"Tianjin University,College of Intelligence and Computing,Tianjin,China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00444"},{"key":"ref3","article-title":"Nesterov accelerated gradient and scale invariance for adversarial attacks","author":"Lin","year":"2019"},{"key":"ref4","article-title":"Adversarial machine learning at scale","author":"Kurakin","year":"2016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00754"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01457"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00196"},{"issue":"1","key":"ref9","first-page":"1929","article-title":"Dropout: a simple way to prevent neural networks from overfitting","volume":"15","author":"Srivastava","year":"2014","journal-title":"The journal of machine learning research"},{"key":"ref10","article-title":"Improving the transferability of adversarial examples with new iteration framework and input dropout","author":"Xie","year":"2021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00051"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3475724.3483604"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"ref14","article-title":"Ensemble adversarial training: Attacks and defenses","author":"Tram\u00e8r","year":"2017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00191"},{"key":"ref16","article-title":"Mitigating adversarial effects through randomization","author":"Xie","year":"2017"},{"key":"ref17","article-title":"Defense against adversarial attacks-3rd place","author":"Thomas","year":"2017"},{"key":"ref18","article-title":"Countering adversarial images using input transformations","author":"Guo","year":"2017"},{"key":"ref19","article-title":"Certified robustness for top-k predictions against adversarial perturbations via randomized smoothing","author":"Jia","year":"2019"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00034"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19772-7_32"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103135"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00284"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01585"}],"event":{"name":"ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Hyderabad, India","start":{"date-parts":[[2025,4,6]]},"end":{"date-parts":[[2025,4,11]]}},"container-title":["ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10887540\/10887541\/10888268.pdf?arnumber=10888268","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T05:27:06Z","timestamp":1774416426000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10888268\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icassp49660.2025.10888268","relation":{},"subject":[],"published":{"date-parts":[[2025,4,6]]}}}