{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:39:46Z","timestamp":1762522786207,"version":"3.44.0"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1936218","62072037"],"award-info":[{"award-number":["U1936218","62072037"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Artif. Intell."],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1109\/tai.2023.3253083","type":"journal-article","created":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T13:50:28Z","timestamp":1678110628000},"page":"412-419","source":"Crossref","is-referenced-by-count":4,"title":["Crafting Transferable Adversarial Examples Against Face Recognition via Gradient Eroding"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4840-6558","authenticated-orcid":false,"given":"Huipeng","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0962-4464","authenticated-orcid":false,"given":"Yajie","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6404-8853","authenticated-orcid":false,"given":"Yu-an","family":"Tan","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0737-7420","authenticated-orcid":false,"given":"Shangbo","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9598-5687","authenticated-orcid":false,"given":"Yuhang","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5094-7388","authenticated-orcid":false,"given":"Quanxin","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1931-366X","authenticated-orcid":false,"given":"Yuanzhang","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref2","article-title":"Very deep convolutional networks for large-scale image recognition","volume-title":"Proc. 3rd Int. Conf. Learn. Representations","author":"Simonyan","year":"7-9, 2015"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4324\/9781410605337-29"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1023\/B:VISI.0000013087.49260.fb","article-title":"Robust real-time object detection","volume":"57","author":"Viola","year":"2001","journal-title":"Int. J. Comput. Vis."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.2004.1301512"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.73"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.1995.1004"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58520-4_11"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/173"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3168874"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/int.23031"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/int.22932"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2021.03.003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.08.087"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2021.00.126"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/int.22784"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2021.00.269"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13161"},{"key":"ref19","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. 3rd Int. Conf. Learn. Representations","author":"Goodfellow","year":"7-9, 2015"},{"key":"ref20","article-title":"Intriguing properties of neural networks","volume-title":"Proc. 2nd Int. Conf. Learn. Representations","author":"Szegedy","year":"14-16, 2014"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref25","article-title":"Delving into transferable adversarial examples and black-box attacks","volume":"abs\/1611.02770","author":"Liu","year":"2016","journal-title":"CoRR"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00284"},{"key":"ref28","article-title":"Understanding and enhancing the transferability of adversarial examples","volume":"abs\/1605.07277","author":"Wu","year":"2016","journal-title":"CoRR"},{"article-title":"Transferability in machine learning: From phenomena to black-box attacks using adversarial samples","year":"2016","author":"Papernot","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01264-9_28"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94042-7_11"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6810"},{"key":"ref33","article-title":"Nesterov accelerated gradient and scale invariance for adversarial attacks","volume-title":"Proc. 8th Int. Conf. Learn. Representations","author":"Lin","year":"26-30, 2020"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00444"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00552"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97909-0_46"},{"key":"ref39","article-title":"Delving into the adversarial robustness on face recognition","volume":"abs\/2007.04118","author":"Yang","year":"2020","journal-title":"CoRR"},{"key":"ref40","article-title":"Face.evolve: A high-performance face recognition library","volume":"abs\/2107.08621","author":"Wang","year":"2021","journal-title":"CoRR"},{"key":"ref41","article-title":"Labeled faces in the wild: A database forstudying face recognition in unconstrained environments","volume-title":"Proc. Workshop Faces Real-Life Images: Detection, Alignment, Recognit.","author":"Huang","year":"2008"},{"key":"ref42","article-title":"Learning face representation from scratch","volume":"abs\/1411.7923","author":"Yi","year":"2014","journal-title":"CoRR"},{"key":"ref43","article-title":"Towards deep learning models resistant to adversarial attacks","volume-title":"Proc. 6th Int. Conf. Learn. Representations","author":"Madry","year":"2018"}],"container-title":["IEEE Transactions on Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9078688\/10384607\/10061236.pdf?arnumber=10061236","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:08:52Z","timestamp":1755911332000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10061236\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":43,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tai.2023.3253083","relation":{},"ISSN":["2691-4581"],"issn-type":[{"type":"electronic","value":"2691-4581"}],"subject":[],"published":{"date-parts":[[2024,1]]}}}