{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:24:08Z","timestamp":1766298248080,"version":"3.40.4"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,27]],"date-time":"2024-12-27T00:00:00Z","timestamp":1735257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,27]],"date-time":"2024-12-27T00:00:00Z","timestamp":1735257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,27]]},"DOI":"10.1109\/icvisp64524.2024.10959694","type":"proceedings-article","created":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T17:37:52Z","timestamp":1744911472000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Adversarial Attacks with Minimal Perturbations"],"prefix":"10.1109","author":[{"given":"Haijun","family":"Su","sequence":"first","affiliation":[{"name":"Development Center, China Information Technology, Designing &#x0026; Consulting Institute Co., Ltd,Beijing,China"}]},{"given":"Mengyuan","family":"Zhu","sequence":"additional","affiliation":[{"name":"Development Center, China Information Technology, Designing &#x0026; Consulting Institute Co., Ltd,Beijing,China"}]},{"given":"Mengqi","family":"Liu","sequence":"additional","affiliation":[{"name":"Development Center, China Information Technology, Designing &#x0026; Consulting Institute Co., Ltd,Beijing,China"}]},{"given":"Yunwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Development Center, China Information Technology, Designing &#x0026; Consulting Institute Co., Ltd,Beijing,China"}]},{"given":"Qian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Development Center, China Information Technology, Designing &#x0026; Consulting Institute Co., Ltd,Beijing,China"}]},{"given":"Zekun","family":"Yang","sequence":"additional","affiliation":[{"name":"Development Center, China Information Technology, Designing &#x0026; Consulting Institute Co., Ltd,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"ref3","article-title":"Analysis of universal adversarial perturbations","author":"Dezfooli","year":"2017","journal-title":"arXiv preprint"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.172"},{"key":"ref5","article-title":"ARotation and a Translation Suffice: Fooling CNNs with Simple Transformations","author":"Logan","year":"2017","journal-title":"arXiv preprint"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"ref7","article-title":"Learning with a strong adversary","author":"Huang","year":"2015","journal-title":"arXiv preprint"},{"key":"ref8","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv:1312.6199"},{"key":"ref9","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref12","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv: 1706.06083"},{"key":"ref13","first-page":"2574","article-title":"DeepFool:A simple and accurate method to fool deep neural networks","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Moosavi-Dezfooli","year":"2016"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2010.2059031"},{"key":"ref17","article-title":"Deep inside convolutional networks: Visualising image classifification models and saliency maps","author":"Simonyan","year":"2013","journal-title":"arXiv: 1312.6034"}],"event":{"name":"2024 IEEE 8th International Conference on Vision, Image and Signal Processing (ICVISP)","start":{"date-parts":[[2024,12,27]]},"location":"Kunming, China","end":{"date-parts":[[2024,12,29]]}},"container-title":["2024 IEEE 8th International Conference on Vision, Image and Signal Processing (ICVISP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10959324\/10959149\/10959694.pdf?arnumber=10959694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T05:15:37Z","timestamp":1744953337000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10959694\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,27]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icvisp64524.2024.10959694","relation":{},"subject":[],"published":{"date-parts":[[2024,12,27]]}}}