{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:26:17Z","timestamp":1742383577674},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T00:00:00Z","timestamp":1632009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T00:00:00Z","timestamp":1632009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,19]]},"DOI":"10.1109\/icip42928.2021.9506671","type":"proceedings-article","created":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T21:08:41Z","timestamp":1629752921000},"page":"1904-1908","source":"Crossref","is-referenced-by-count":2,"title":["Regularized Intermediate Layers Attack: Adversarial Examples With High Transferability"],"prefix":"10.1109","author":[{"given":"Xiaorui","family":"Li","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Information and Communication Engineering,Chengdu,China,611731"}]},{"given":"Weiyu","family":"Cui","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Information and Communication Engineering,Chengdu,China,611731"}]},{"given":"Jiawei","family":"Huang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Information and Communication Engineering,Chengdu,China,611731"}]},{"given":"Wenyi","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Information and Communication Engineering,Chengdu,China,611731"}]},{"given":"Jianwen","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Information and Communication Engineering,Chengdu,China,611731"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"ref11","article-title":"One pixel attack for fooling deep neural networks","author":"su","year":"2017","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00284"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00483"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272695"},{"key":"ref16","article-title":"Network dissection:quantifying interpretability of deep visual representations","author":"bau","year":"2017","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"ref17","article-title":"Composite adversarial attacks","author":"mao","year":"2021","journal-title":"Association for the Advancement of Artificial Intelligence (AAAI)"},{"key":"ref18","article-title":"Towards feature space adversarial attack","author":"xu","year":"2021","journal-title":"Association for the Advancement of Artificial Intelligence (AAAI)"},{"key":"ref19","article-title":"Visualizing and understanding convolutional networks","author":"zeiler","year":"2014","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599707"},{"key":"ref3","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref5","article-title":"Deep-fool: A simple and accurate method to fool deep neural networks","author":"moosavi-dezfooli","year":"2016","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"ref8","article-title":"Adversarial examples in the physical world","author":"kurakin","year":"2017","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref1","article-title":"Deep residual learning for image recognition","author":"he","year":"2015","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126474"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01264-9_28"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI44817.2019.9002817"}],"event":{"name":"2021 IEEE International Conference on Image Processing (ICIP)","start":{"date-parts":[[2021,9,19]]},"location":"Anchorage, AK, USA","end":{"date-parts":[[2021,9,22]]}},"container-title":["2021 IEEE International Conference on Image Processing (ICIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9506008\/9506009\/09506671.pdf?arnumber=9506671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T21:11:25Z","timestamp":1655154685000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9506671\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,19]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icip42928.2021.9506671","relation":{},"subject":[],"published":{"date-parts":[[2021,9,19]]}}}