{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T11:45:28Z","timestamp":1768391128250,"version":"3.49.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T00:00:00Z","timestamp":1758412800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T00:00:00Z","timestamp":1758412800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,21]]},"DOI":"10.1109\/mmsp64401.2025.11324099","type":"proceedings-article","created":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T20:55:15Z","timestamp":1768337715000},"page":"192-197","source":"Crossref","is-referenced-by-count":0,"title":["Exploring Cross-Stage Adversarial Transferability in Class-Incremental Continual Learning"],"prefix":"10.1109","author":[{"given":"Jungwoo","family":"Kim","sequence":"first","affiliation":[{"name":"Yonsei University,School of Integrated Technology \/ BK21 Graduate Program in Intelligent Semiconductor Technology,Seoul,Republic of Korea"}]},{"given":"Jong-Seok","family":"Lee","sequence":"additional","affiliation":[{"name":"Yonsei University,School of Integrated Technology \/ BK21 Graduate Program in Intelligent Semiconductor Technology,Seoul,Republic of Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-022-00568-3"},{"key":"ref2","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. Int. Conf. Learning Representations (ICLR)","author":"Goodfellow"},{"key":"ref3","article-title":"Towards deep learning models resistant to adversarial attacks","volume-title":"Proc. Int. Conf. Learning Representations (ICLR)","author":"Schmidt"},{"key":"ref4","article-title":"Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks","volume-title":"Proc. Int. Conf. Machine Learning (ICML)","author":"Croce"},{"key":"ref5","article-title":"Delving into transferable adversarial examples and black-box attacks","volume-title":"Proc. Int. Conf. Learning Representations (ICLR)","author":"Liu"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00891"},{"key":"ref7","article-title":"A survey on transferability of adversarial examples across deep neural networks","author":"Gu","year":"2024","journal-title":"Trans. Mach. Learn. Res. (TMLR)"},{"key":"ref8","author":"Khan","year":"2023","journal-title":"Susceptibility of continual learning against adversarial attacks"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10096163"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP51287.2024.10647958"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3455090"},{"key":"ref12","author":"Ru","year":"2024","journal-title":"Maintaining adversarial robustness in continuous learning"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i3.32254"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3367329"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.587"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1611835114"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2773081"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58536-5_31"},{"key":"ref19","article-title":"New insights on reducing abrupt representation change in online continual learning","volume-title":"Proc. Int. Conf. Learning Representations (ICLR)","author":"Caccia"},{"issue":"363","key":"ref20","first-page":"1","article-title":"Avalanche: A pytorch library for deep continual learning","volume":"24","author":"Carta","year":"2023","journal-title":"J. Mach. Learn. Res. (JMLR)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"key":"ref22","article-title":"Learning multiple layers of features from tiny images","volume-title":"Master\u2019s thesis","author":"Krizhevsky","year":"2009"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref24","article-title":"Minimally distorted adversarial examples with a fast adaptive boundary attack","volume-title":"Proc. Int. Conf. Machine Learning (ICML)","author":"Croce"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"ref26","article-title":"Similarity of neural architectures based on input gradient transferability","volume-title":"Proc. Eur. Conf. Computer Vision (ECCV)","author":"Hwang"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00141"},{"key":"ref28","author":"Klause","year":"2025","journal-title":"The relationship between network similarity and transferability of adversarial attacks"},{"key":"ref29","author":"Simonyan","year":"2013","journal-title":"Deep inside convolutional networks: Visualising image classification models and saliency maps"},{"key":"ref30","article-title":"Similarity of neural network representations revisited","volume-title":"Proc. Int. Conf. Machine Learning (ICML)","author":"Kornblith"},{"key":"ref31","article-title":"Evaluating the robustness of neural networks: An extreme value theory approach","volume-title":"Proc. Int. Conf. Learning Representations (ICLR)","author":"Weng"},{"key":"ref32","author":"Sabanayagam","year":"2023","journal-title":"Unveiling the hessian\u2019s connection to the decision boundary"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00359"}],"event":{"name":"2025 IEEE International Workshop on Multimedia Signal Processing (MMSP)","location":"Beijing, China","start":{"date-parts":[[2025,9,21]]},"end":{"date-parts":[[2025,9,23]]}},"container-title":["2025 IEEE International Workshop on Multimedia Signal Processing (MMSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11324077\/11324018\/11324099.pdf?arnumber=11324099","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T07:01:20Z","timestamp":1768374080000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11324099\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,21]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/mmsp64401.2025.11324099","relation":{},"subject":[],"published":{"date-parts":[[2025,9,21]]}}}