{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T11:59:20Z","timestamp":1753358360650},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,30]]},"DOI":"10.1109\/ijcnn60899.2024.10651160","type":"proceedings-article","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:35:05Z","timestamp":1725903305000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Boosting the Transferability of Adversarial Examples via Adaptive Attention and Gradient Purification Methods"],"prefix":"10.1109","author":[{"given":"Liwen","family":"Wu","sequence":"first","affiliation":[{"name":"Yunnan University,School of Software,Kunming,China"}]},{"given":"Lei","family":"Zhao","sequence":"additional","affiliation":[{"name":"Yunnan University,School of Software,Kunming,China"}]},{"given":"Bin","family":"Pu","sequence":"additional","affiliation":[{"name":"Hunan University,College of Computer Science and Electronic Engineering,Changsha,China"}]},{"given":"Yi","family":"Zhao","sequence":"additional","affiliation":[{"name":"Yunnan University,School of Software,Kunming,China"}]},{"given":"Xin","family":"Jin","sequence":"additional","affiliation":[{"name":"Yunnan University,School of Software,Kunming,China"}]},{"given":"Shao Wen","family":"Yao","sequence":"additional","affiliation":[{"name":"Yunnan University,National Pilot School of Software,Kunming,China"}]}],"member":"263","reference":[{"article-title":"End to end learning for self-driving cars","year":"2016","author":"Bojarski","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"article-title":"Intriguing properties of neural networks","volume-title":"International Conference on Learning Representations","author":"Bruna","key":"ref3"},{"article-title":"Explaining and harnessing adversarial examples","volume-title":"International Conference on Learning Representations","author":"Goodfellow","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"article-title":"Delving into transferable adversarial examples and black-box attacks","volume-title":"International Conference on Learning Representations","author":"Liu","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00284"},{"article-title":"Nesterov accelerated gradient and scale invariance for adversarial attacks","volume-title":"International Conference on Learning Representations","author":"Lin","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00444"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612070"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"article-title":"Boosting adversarial transferability through enhanced momentum","year":"2021","author":"Wang","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN54540.2023.10191329"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00124"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICME52920.2022.9859848"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01585"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00790"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102720"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01488"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN54540.2023.10191049"},{"article-title":"Towards deep learning models resistant to adversarial attacks","year":"2017","author":"Madry","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00792"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00034"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00191"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23198"},{"key":"ref29","first-page":"41429","article-title":"Detecting adversarial data by probing multiple perturbations using expected perturbation score","volume-title":"International Conference on Machine Learning","author":"Shuhai"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.5555\/3298023.3298188"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"article-title":"Ensemble adversarial training: Attacks and defenses","volume-title":"International Conference on Learning Representations","author":"Tram\u00e8r","key":"ref34"},{"article-title":"Mitigating adversarial effects through randomization","volume-title":"International Conference on Learning Representations","author":"Xie","key":"ref35"},{"key":"ref36","first-page":"1310","article-title":"Certified adversarial robustness via randomized smoothing","volume-title":"International Conference on Machine Learning","author":"Cohen"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"}],"event":{"name":"2024 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2024,6,30]]},"location":"Yokohama, Japan","end":{"date-parts":[[2024,7,5]]}},"container-title":["2024 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10649807\/10649898\/10651160.pdf?arnumber=10651160","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T06:54:54Z","timestamp":1725951294000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10651160\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,30]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/ijcnn60899.2024.10651160","relation":{},"subject":[],"published":{"date-parts":[[2024,6,30]]}}}