{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:12:52Z","timestamp":1778166772475,"version":"3.51.4"},"reference-count":78,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB3103500"],"award-info":[{"award-number":["2022YFB3103500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62106026"],"award-info":[{"award-number":["62106026"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005230","name":"Natural Science Foundation of Chongqing","doi-asserted-by":"publisher","award":["cstc2021jcyj-msxmX0273"],"award-info":[{"award-number":["cstc2021jcyj-msxmX0273"]}],"id":[{"id":"10.13039\/501100005230","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Postdoctoral Fellowship Program of CPSF","award":["GZC20233323"],"award-info":[{"award-number":["GZC20233323"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. Video Technol."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1109\/tcsvt.2024.3502693","type":"journal-article","created":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T19:13:25Z","timestamp":1732130005000},"page":"3368-3382","source":"Crossref","is-referenced-by-count":7,"title":["LESEP: Boosting Adversarial Transferability via Latent Encoding and Semantic Embedding Perturbations"],"prefix":"10.1109","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6716-0039","authenticated-orcid":false,"given":"Yan","family":"Gan","sequence":"first","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2408-5850","authenticated-orcid":false,"given":"Chengqian","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2259-886X","authenticated-orcid":false,"given":"Deqiang","family":"Ouyang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]},{"given":"Song","family":"Tang","sequence":"additional","affiliation":[{"name":"Institute of Machine Intelligence, University of Shanghai for Science and Technology, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4760-8702","authenticated-orcid":false,"given":"Mao","family":"Ye","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9439-4623","authenticated-orcid":false,"given":"Tao","family":"Xiang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"17","article-title":"MetaDelta: A meta-learning system for few-shot image classification","volume-title":"Proc. AAAI Workshop Meta-Learn. MetaDL Challenge","author":"Chen"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2024.3408256"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2969791"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2024.3418979"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3679013"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-023-01892-w"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02238"},{"key":"ref8","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv:1312.6199"},{"key":"ref9","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00416"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3263054"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3430508"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00112"},{"key":"ref14","article-title":"Unrestricted adversarial examples","author":"Brown","year":"2018","journal-title":"arXiv:1809.08352"},{"key":"ref15","article-title":"Spatially transformed adversarial examples","author":"Xiao","year":"2018","journal-title":"arXiv:1801.02612"},{"key":"ref16","article-title":"ADef: An iterative algorithm to construct adversarial deformations","author":"Alaifari","year":"2018","journal-title":"arXiv:1804.07729"},{"key":"ref17","article-title":"Unrestricted adversarial examples via semantic manipulation","author":"Bhattad","year":"2019","journal-title":"arXiv:1904.06347"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58568-6_2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00212"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00123"},{"key":"ref21","first-page":"8312","article-title":"Constructing unrestricted adversarial examples with generative models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Song"},{"key":"ref22","article-title":"AT-GAN: An adversarial generator model for non-constrained adversarial examples","author":"Wang","year":"2019","journal-title":"arXiv:1904.07793"},{"key":"ref23","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. NIPS","volume":"33","author":"Ho"},{"key":"ref24","article-title":"Denoising diffusion implicit models","author":"Song","year":"2020","journal-title":"arXiv:2010.02502"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00421"},{"key":"ref26","article-title":"Diffusion models for imperceptible and transferable adversarial attack","author":"Chen","year":"2023","journal-title":"arXiv:2305.08192"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref29","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref30","first-page":"2206","article-title":"Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Croce"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00284"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00444"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref35","article-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models","author":"Brendel","year":"2017","journal-title":"arXiv:1712.04248"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01967"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01965"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969125"},{"key":"ref40","first-page":"1","article-title":"Generative adversarial networks with learnable auxiliary module for image synthesis","volume":"2024","author":"Gan","year":"2024","journal-title":"ACM Trans. Multimedia Comput., Commun., Appl."},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.111353"},{"key":"ref42","article-title":"AdvDiff: Generating unrestricted adversarial examples using diffusion models","author":"Dai","year":"2023","journal-title":"arXiv:2307.12499"},{"key":"ref43","article-title":"Semantic adversarial attacks via diffusion models","author":"Wang","year":"2023","journal-title":"arXiv:2309.07398"},{"key":"ref44","first-page":"2256","article-title":"Deep unsupervised learning using nonequilibrium thermodynamics","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Sohl-Dickstein"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00037"},{"key":"ref46","article-title":"Classifier-free diffusion guidance","author":"Ho","year":"2022","journal-title":"arXiv:2207.12598"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00585"},{"key":"ref48","article-title":"Hierarchical text-conditional image generation with CLIP latents","author":"Ramesh","year":"2022","journal-title":"arXiv:2204.06125"},{"key":"ref49","first-page":"8633","article-title":"Video diffusion models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Ho"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00675"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00963"},{"key":"ref52","article-title":"Diffusion models for adversarial purification","author":"Nie","year":"2022","journal-title":"arXiv:2205.07460"},{"key":"ref53","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"Proc. Int. Conf. Mach. Learn.","volume":"139","author":"Radford"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1312.6114"},{"key":"ref55","article-title":"Prompt-to-prompt image editing with cross attention control","author":"Hertz","year":"2022","journal-title":"arXiv:2208.01626"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01225-0_13"},{"key":"ref57","article-title":"The caltech-ucsd birds-200-2011 dataset","author":"Wah","year":"2011"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2013.77"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref61","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv:1409.1556"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"ref64","article-title":"An image is worth 16\u00d716 words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2020","journal-title":"arXiv:2010.11929"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"ref66","first-page":"10347","article-title":"Training data-efficient image transformers & distillation through attention","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Touvron"},{"key":"ref67","first-page":"24261","article-title":"MLP-mixer: An all-MLP architecture for vision","volume-title":"Proc. 35th Conf. Neural Inf. Process. Syst.","volume":"34","author":"Tolstikhin"},{"key":"ref68","article-title":"Mitigating adversarial effects through randomization","author":"Xie","year":"2017","journal-title":"arXiv:1711.01991"},{"key":"ref69","article-title":"Defense against adversarial attacks-3rd place","author":"Thomas","year":"2017"},{"key":"ref70","first-page":"12885","article-title":"Cross-domain transferability of adversarial perturbations","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Naseer"},{"key":"ref71","first-page":"195","article-title":"Adversarial attacks and defences competition","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NIPS)","author":"Kurakin"},{"key":"ref72","article-title":"Ensemble adversarial training: Attacks and defenses","author":"Tram\u00e8r","year":"2017","journal-title":"arXiv:1705.07204"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58604-1_19"},{"key":"ref75","first-page":"549","article-title":"Frequency domain model augmentation for adversarial attack","volume-title":"Proc. Eur. Conf. Comput. Vis.","author":"Long"},{"key":"ref76","first-page":"7546","article-title":"Natural color fool: Towards boosting black-box unrestricted attacks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Yuan"},{"key":"ref77","first-page":"1","article-title":"SDEdit: Guided image synthesis and editing with stochastic differential equations","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Meng"},{"key":"ref78","article-title":"Decoupled weight decay regularization","author":"Loshchilov","year":"2017","journal-title":"arXiv:1711.05101"}],"container-title":["IEEE Transactions on Circuits and Systems for Video Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/76\/10949577\/10758825.pdf?arnumber=10758825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T22:13:10Z","timestamp":1744063990000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10758825\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":78,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tcsvt.2024.3502693","relation":{},"ISSN":["1051-8215","1558-2205"],"issn-type":[{"value":"1051-8215","type":"print"},{"value":"1558-2205","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4]]}}}