{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T10:08:23Z","timestamp":1766138903471},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T00:00:00Z","timestamp":1721001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T00:00:00Z","timestamp":1721001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,15]]},"DOI":"10.1109\/icme57554.2024.10687455","type":"proceedings-article","created":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T17:24:16Z","timestamp":1727717056000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing Adversarial Transferability on Vision Transformer by Permutation-Invariant Attacks"],"prefix":"10.1109","author":[{"given":"Haoyu","family":"Deng","sequence":"first","affiliation":[{"name":"Shenzhen Campus of Sun Yat-sen University,School of Cyber Science and Technology,Shenzhen,China"}]},{"given":"Yanmei","family":"Fang","sequence":"additional","affiliation":[{"name":"Shenzhen Campus of Sun Yat-sen University,School of Cyber Science and Technology,Shenzhen,China"}]},{"given":"Fangjun","family":"Huang","sequence":"additional","affiliation":[{"name":"Shenzhen Campus of Sun Yat-sen University,School of Cyber Science and Technology,Shenzhen,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2010.11929"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00717"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00863"},{"key":"ref6","first-page":"12077","article-title":"SegFormer: Simple and efficient design for semantic segmentation with transformers","volume-title":"Proceedings of the Advances in Neural Information Processing Systems (NeurIPS 2021)","author":"Xie"},{"key":"ref7","first-page":"10347","article-title":"Training data-efficient image transformers & distillation through attention","volume-title":"Proceedings of the International Conference on Machine Learning (ICML 2021)","author":"Touvron"},{"key":"ref8","first-page":"1","article-title":"Intriguing properties of neural networks","volume-title":"Proceedings of the International Conference on Learning Representations (ICLR 2014)","author":"Szegedy"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00846"},{"key":"ref10","first-page":"1","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proceedings of the International Conference on Learning Representations (ICLR 2015)","author":"Goodfellow"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref12","first-page":"1","article-title":"Benchmarking neural network robustness to common corruptions and perturbations","volume-title":"Proceedings of the International Conference on Learning Representations (ICLR 2019)","author":"Hendrycks"},{"key":"ref13","first-page":"23296","article-title":"Intriguing properties of vision transformers","volume-title":"Proceedings of the Advances in Neural Information Processing Systems (NeurIPS 2021)","author":"Naseer"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2105.07581"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref16","first-page":"1","article-title":"Nesterov accelerated gradient and scale invariance for adversarial attacks","volume-title":"Proceedings of the International Conference on Learning Representations (ICLR 2020)","author":"Lin"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00284"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00444"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7502-7_79-1"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01585"},{"key":"ref22","first-page":"1","article-title":"On improving adversarial transferability of vision transformers","volume-title":"Proceedings of the International Conference on Learning Representations (ICLR 2022)","author":"Naseer"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i3.20169"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01575"}],"event":{"name":"2024 IEEE International Conference on Multimedia and Expo (ICME)","start":{"date-parts":[[2024,7,15]]},"location":"Niagara Falls, ON, Canada","end":{"date-parts":[[2024,7,19]]}},"container-title":["2024 IEEE International Conference on Multimedia and Expo (ICME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10685847\/10687354\/10687455.pdf?arnumber=10687455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T06:32:16Z","timestamp":1727764336000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10687455\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,15]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icme57554.2024.10687455","relation":{},"subject":[],"published":{"date-parts":[[2024,7,15]]}}}