{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:42:22Z","timestamp":1776886942855,"version":"3.51.2"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"20","license":[{"start":{"date-parts":[[2023,10,15]],"date-time":"2023-10-15T00:00:00Z","timestamp":1697328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,10,15]],"date-time":"2023-10-15T00:00:00Z","timestamp":1697328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,15]],"date-time":"2023-10-15T00:00:00Z","timestamp":1697328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"publisher","award":["62106158"],"award-info":[{"award-number":["62106158"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"publisher","award":["62272324"],"award-info":[{"award-number":["62272324"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011347","name":"State Key Laboratory of Software Development Environment","doi-asserted-by":"publisher","award":["SKLSDE-2020KF-08"],"award-info":[{"award-number":["SKLSDE-2020KF-08"]}],"id":[{"id":"10.13039\/501100011347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003213","name":"Research and Development Program of Beijing Municipal Education Commission","doi-asserted-by":"publisher","award":["KM202210028007"],"award-info":[{"award-number":["KM202210028007"]}],"id":[{"id":"10.13039\/501100003213","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2023,10,15]]},"DOI":"10.1109\/jiot.2023.3280737","type":"journal-article","created":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T17:40:12Z","timestamp":1685382012000},"page":"17785-17796","source":"Crossref","is-referenced-by-count":10,"title":["Imperceptible Adversarial Attack With Multigranular Spatiotemporal Attention for Video Action Recognition"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4695-5211","authenticated-orcid":false,"given":"Guoming","family":"Wu","sequence":"first","affiliation":[{"name":"Information Engineering College, Capital Normal University, Beijing, China"}]},{"given":"Yangfan","family":"Xu","sequence":"additional","affiliation":[{"name":"Information Engineering College, Capital Normal University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5009-6536","authenticated-orcid":false,"given":"Jun","family":"Li","sequence":"additional","affiliation":[{"name":"Information Engineering College, Capital Normal University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3562-8602","authenticated-orcid":false,"given":"Zhiping","family":"Shi","sequence":"additional","affiliation":[{"name":"Information Engineering College, Capital Normal University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8425-4195","authenticated-orcid":false,"given":"Xianglong","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Adversarial attacks for optical flow-based action recognition classifiers","author":"inkawhich","year":"2018","journal-title":"arXiv 1811 11875"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00757"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747698"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00058"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23202"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33018973"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00326"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3120479"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01028"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01442"},{"key":"ref10","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2017","journal-title":"arXiv 1706 06083"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3099164"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00193"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00324"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.502"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.510"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00664"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01066"},{"key":"ref46","article-title":"Averaging weights leads to wider optima and better generalization","author":"izmailov","year":"2018","journal-title":"arXiv 1803 05407"},{"key":"ref45","first-page":"1","article-title":"Robust overfitting may be mitigated by properly learned smoothening","author":"chen","year":"2020","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref48","article-title":"Fixing data augmentation to improve adversarial robustness","author":"rebuffi","year":"2021","journal-title":"arXiv 2103 01946"},{"key":"ref47","first-page":"1","article-title":"Improving adversarial robustness requires revisiting misclassified examples","author":"wang","year":"2019","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3034899"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3124815"},{"key":"ref44","first-page":"8093","article-title":"Overfitting in adversarially robust deep learning","author":"rice","year":"2020","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011028"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS52988.2021.9663769"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref7","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"arXiv 1312 6199"},{"key":"ref9","article-title":"Delving into transferable adversarial examples and black-box attacks","author":"liu","year":"2016","journal-title":"arXiv 1611 02770"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3068375"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3063504"},{"key":"ref6","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"arXiv 1412 6572"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2954804"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3138795"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3017006"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i3.20279"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01491"},{"key":"ref36","first-page":"975","article-title":"Watch out! Motion is blurring the vision of your deep neural networks","volume":"33","author":"guo","year":"2020","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3111024"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01501"},{"key":"ref33","article-title":"Improving adversarial transferability with spatial momentum","author":"wang","year":"2022","journal-title":"arXiv 2203 13479"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3180207"},{"key":"ref2","article-title":"UCF101: A dataset of 101 human actions classes from videos in the wild","author":"soomro","year":"2012"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126543"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01580"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3016145"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00718"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46484-8_2"},{"key":"ref26","first-page":"2574","article-title":"A simple and accurate method to fool deep neural networks","author":"moosavi","year":"2016","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.590"},{"key":"ref22","first-page":"4694","article-title":"Beyond short snippets: Deep networks for video classification","author":"ng","year":"2015","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00675"},{"key":"ref28","article-title":"Adversarial manipulation of deep representations","author":"sabour","year":"2015","journal-title":"arXiv 1511 05122"},{"key":"ref27","first-page":"1765","article-title":"Universal adversarial perturbations","author":"moosavi","year":"2017","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit"},{"key":"ref29","first-page":"1","article-title":"Synthesizing robust adversarial examples","author":"athalye","year":"2018","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10269651\/10138362.pdf?arnumber=10138362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T18:22:17Z","timestamp":1698085337000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10138362\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,15]]},"references-count":61,"journal-issue":{"issue":"20"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2023.3280737","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,15]]}}}