{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:02:20Z","timestamp":1755993740452,"version":"3.44.0"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000190","name":"U.S. Department of Commerce","doi-asserted-by":"publisher","award":["BS123456"],"award-info":[{"award-number":["BS123456"]}],"id":[{"id":"10.13039\/100000190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Artif. Intell."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tai.2024.3429473","type":"journal-article","created":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T13:45:00Z","timestamp":1721396700000},"page":"5655-5665","source":"Crossref","is-referenced-by-count":2,"title":["Deep Learning Security Breach by Evolutionary Universal Perturbation Attack (EUPA)"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4634-547X","authenticated-orcid":false,"given":"Neeraj","family":"Gupta","sequence":"first","affiliation":[{"name":"Oakland University, Rochester, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5375-391X","authenticated-orcid":false,"given":"Mahdi","family":"Khosravy","sequence":"additional","affiliation":[{"name":"Cross Labs, Cross Compass, Ltd., Tokyo, Japan"}]},{"given":"Antoine","family":"Pasquali","sequence":"additional","affiliation":[{"name":"Cross Labs, Cross Compass, Ltd., Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2101-2428","authenticated-orcid":false,"given":"Olaf","family":"Witkowski","sequence":"additional","affiliation":[{"name":"Cross Labs, Cross Compass, Ltd., Tokyo, Japan"}]}],"member":"263","reference":[{"volume-title":"Deep Learning","year":"2016","author":"Goodfellow","key":"ref1"},{"key":"ref2","article-title":"Machine learning for predictive analysis","volume-title":"Proc. Inf. Commun. Technol. Intell. Syst.","author":"Joshi","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3133819"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3133846"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2022.3194503"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3088084"},{"key":"ref7","first-page":"1400","article-title":"Deep face recognizer privacy attack: Model inversion initialization by a deep generative adversarial data space discriminator","volume-title":"Proc. Asia-Pacific Signal Inf. Process. Assoc. Annu. Summit Conf. (APSIPA ASC)","author":"Khosravy","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3140687"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3111139"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8546023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-023-10562-9"},{"article-title":"Adversarial manipulation of deep representations","year":"2015","author":"Sabour","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-017-5663-3"},{"key":"ref15","first-page":"1","article-title":"Robustness of classifiers: From adversarial to random noise","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Fawzi","year":"2016"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"article-title":"Towards deep learning models resistant to adversarial attacks","year":"2017","author":"Madry","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00015"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2861800"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00084"},{"article-title":"Universal adversarial perturbation for text classification","year":"2019","author":"Gao","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00500"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00777"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107584"},{"key":"ref27","first-page":"25","article-title":"Adversarial image perturbation with a genetic algorithm","volume-title":"Proc. 7th Student Comput. Sci. Res. Conf.","author":"Fister","year":"2021"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00409"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-023-06306-z"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3335094"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05239-2"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.54854\/imi2021.01"},{"key":"ref33","first-page":"1","article-title":"Decision support in maintenance for electrical components of distribution networks","volume":"2","author":"Takano","year":"2021","journal-title":"Innovations Mach. Intell. (IMI)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/en15144995"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/en15041378"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"article-title":"Adversarial black-box attacks on text classifiers using multi-objective genetic optimization guided by deep networks","year":"2020","author":"Mathai","key":"ref37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2867954"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3072045"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.4324\/9781410605337-29"},{"key":"ref41","article-title":"Research on face recognition classification based on improved GoogleNet","author":"Zhigang","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"}],"container-title":["IEEE Transactions on Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9078688\/10751744\/10605110.pdf?arnumber=10605110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:09:24Z","timestamp":1755911364000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10605110\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":42,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tai.2024.3429473","relation":{},"ISSN":["2691-4581"],"issn-type":[{"type":"electronic","value":"2691-4581"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}