{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:00:44Z","timestamp":1730250044387,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T00:00:00Z","timestamp":1721001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T00:00:00Z","timestamp":1721001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,15]]},"DOI":"10.1109\/icme57554.2024.10688019","type":"proceedings-article","created":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T17:24:16Z","timestamp":1727717056000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Transferable and high-quality adversarial example generation leveraging diffusion model"],"prefix":"10.1109","author":[{"given":"Kangze","family":"Xu","sequence":"first","affiliation":[{"name":"Sun Yat-sen University,Guangdong Key Lab of Information Security, School of Computer Science and Engineering,Guangzhou,China"}]},{"given":"Ziqiang","family":"He","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University,Guangdong Key Lab of Information Security, School of Computer Science and Engineering,Guangzhou,China"}]},{"given":"Xiangui","family":"Kang","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University,Guangdong Key Lab of Information Security, School of Computer Science and Engineering,Guangzhou,China"}]},{"given":"Z. Jane","family":"Wang","sequence":"additional","affiliation":[{"name":"University of British Columbia,Electrical and Computer Engineering Dept,Vancouver,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2010.11929"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3332218"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414670"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00130"},{"key":"ref7","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume":"33","author":"Ho","year":"2020","journal-title":"Advances in neural information processing systems(NeurIPS)"},{"article-title":"Denoising diffusion implicit models","volume-title":"International Conference on Learning Representations(ICLR)","author":"Song","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref10","article-title":"Photorealistic text-to-image diffusion models with deep language understanding","author":"Saharia","year":"2022","journal-title":"Advances in neural information processing systems(NeurIPS)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025854"},{"article-title":"Explaining and harnessing adversarial examples","volume-title":"International Conference on Learning Representations(ICLR)","author":"Ian","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00284"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00444"},{"article-title":"Nesterov accelerated gradient and scale invariance for adversarial attacks","volume-title":"International Conference on Learning Representations(ICLR)","author":"Lin","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"ref18","article-title":"Diffusion-based adversarial sample generation for improved stealthiness and controllability","author":"Xue","year":"2023","journal-title":"Advances in Neural Information Processing Systems(NeurIPS)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00421"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICME51207.2021.9428316"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"article-title":"Very deep convolutional networks for large-scale image recognition","volume-title":"International Conference on Learning Representations(ICLR)","author":"Simonyan","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"ref25","first-page":"10347","article-title":"Training data-efficient image transformers & distillation through attention","volume-title":"International conference on machine learning","author":"Touvron"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00040"}],"event":{"name":"2024 IEEE International Conference on Multimedia and Expo (ICME)","start":{"date-parts":[[2024,7,15]]},"location":"Niagara Falls, ON, Canada","end":{"date-parts":[[2024,7,19]]}},"container-title":["2024 IEEE International Conference on Multimedia and Expo (ICME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10685847\/10687354\/10688019.pdf?arnumber=10688019","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T06:37:43Z","timestamp":1727764663000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10688019\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,15]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icme57554.2024.10688019","relation":{},"subject":[],"published":{"date-parts":[[2024,7,15]]}}}