{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:43:32Z","timestamp":1761061412100,"version":"3.37.3"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,1,10]],"date-time":"2021-01-10T00:00:00Z","timestamp":1610236800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,10]],"date-time":"2021-01-10T00:00:00Z","timestamp":1610236800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,10]],"date-time":"2021-01-10T00:00:00Z","timestamp":1610236800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004739","name":"Youth Innovation Promotion Association of Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["2019141"],"award-info":[{"award-number":["2019141"]}],"id":[{"id":"10.13039\/501100004739","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,10]]},"DOI":"10.1109\/icpr48806.2021.9412611","type":"proceedings-article","created":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T02:15:54Z","timestamp":1620267354000},"page":"541-548","source":"Crossref","is-referenced-by-count":7,"title":["F-mixup: Attack CNNs From Fourier Perspective"],"prefix":"10.1109","author":[{"given":"Xiu-Chuan","family":"Li","sequence":"first","affiliation":[]},{"given":"Xu-Yao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Cheng-Lin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"2484","article-title":"Simple black-box adversarial attacks","author":"guo","year":"0","journal-title":"International Conference on Machine Learning"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.4.002379"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2641456"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00353"},{"key":"ref14","first-page":"13255","article-title":"A fourier perspective on model robustness in computer vision","author":"yin","year":"0","journal-title":"Advances in neural information processing systems"},{"journal-title":"Explaining and Harnessing Adversarial Examples","year":"2014","author":"goodfellow","key":"ref15"},{"journal-title":"Intriguing properties of neural networks","year":"2013","author":"szegedy","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2858821"},{"key":"ref18","first-page":"949","article-title":"Natural evolution strategies","volume":"15","author":"wierstra","year":"2014","journal-title":"The Journal of Machine Learning Research"},{"journal-title":"mixup Beyond empirical risk minimization","year":"2017","author":"zhang","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-018-1109-z"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref9","first-page":"2137","article-title":"Black-box adversarial attacks with limited queries and information","author":"ilyas","year":"0","journal-title":"International Conference on Machine Learning"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219910"},{"journal-title":"Learning multiple layers of features from tiny images","year":"2009","author":"krizhevsky","key":"ref22"},{"journal-title":"Very Deep Convolutional Networks for Large-scale Image Recognition","year":"2014","author":"simonyan","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1981.12022"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"}],"event":{"name":"2020 25th International Conference on Pattern Recognition (ICPR)","start":{"date-parts":[[2021,1,10]]},"location":"Milan, Italy","end":{"date-parts":[[2021,1,15]]}},"container-title":["2020 25th International Conference on Pattern Recognition (ICPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9411940\/9411911\/09412611.pdf?arnumber=9412611","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:40:50Z","timestamp":1652197250000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9412611\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icpr48806.2021.9412611","relation":{},"subject":[],"published":{"date-parts":[[2021,1,10]]}}}