{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T02:13:29Z","timestamp":1773713609819,"version":"3.50.1"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2023YFB3107401"],"award-info":[{"award-number":["2023YFB3107401"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["T2341003"],"award-info":[{"award-number":["T2341003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62376210"],"award-info":[{"award-number":["62376210"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62161160337"],"award-info":[{"award-number":["62161160337"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62132011"],"award-info":[{"award-number":["62132011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U24B20185"],"award-info":[{"award-number":["U24B20185"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21B2018"],"award-info":[{"award-number":["U21B2018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62206217"],"award-info":[{"award-number":["62206217"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shaanxi Province Key Industry Innovation Program","award":["2023-ZDLGY-38"],"award-info":[{"award-number":["2023-ZDLGY-38"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1109\/tdsc.2025.3637369","type":"journal-article","created":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T19:06:58Z","timestamp":1764184018000},"page":"3538-3553","source":"Crossref","is-referenced-by-count":0,"title":["Quantitative Frequency-Based Framework for Interpreting Adversarial Examples"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8459-4701","authenticated-orcid":false,"given":"Sicong","family":"Han","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6265-7345","authenticated-orcid":false,"given":"Chenhao","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6959-0569","authenticated-orcid":false,"given":"Chao","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"given":"Zhengyu","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1073-7810","authenticated-orcid":false,"given":"Qian","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8967-8525","authenticated-orcid":false,"given":"Qian","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2025.3561569"},{"key":"ref3","first-page":"1","article-title":"A large language model-driven heterogeneous air-ground search swarm","volume-title":"Proc. ICLR Workshop Embodied Intell. Large Lang. Models Open City Environ.","author":"Pu"},{"key":"ref4","first-page":"1106","article-title":"ImageNet classification with deep convolutional neural networks","volume-title":"Proc. Annu. Conf. Neural Inf. Process. Syst.","author":"Krizhevsky"},{"key":"ref5","first-page":"1","article-title":"Intriguing properties of neural networks","volume-title":"Proc. 2nd Int. Conf. Learn. Representations","author":"Szegedy"},{"key":"ref6","first-page":"1","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. 3rd Int. Conf. Learn. Representations","author":"Goodfellow"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.04.008"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.110394"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.110356"},{"key":"ref11","first-page":"1","article-title":"Skip connections matter: On the transferability of adversarial examples generated with resnets","volume-title":"Proc. 8th Int. Conf. Learn. Representations","author":"Wu"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3594869"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00871"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i4.16441"},{"key":"ref15","first-page":"13255","article-title":"A fourier perspective on model robustness in computer vision","volume-title":"Proc. Annu. Conf. Neural Inf. Process. Syst.","author":"Yin"},{"key":"ref16","article-title":"A frequency perspective of adversarial robustness","author":"Maiya","year":"2021"},{"key":"ref17","article-title":"A spectral perspective towards understanding and improving adversarial robustness","author":"Huang","year":"2023"},{"key":"ref18","first-page":"2484","article-title":"Simple black-box adversarial attacks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Guo"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103379"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3156809"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01488"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88052-1_5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref25","first-page":"1","article-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models","volume-title":"Proc. 6th Int. Conf. Learn. Representations","author":"Brendel"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i4.28156"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3289298"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00754"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02291"},{"key":"ref30","first-page":"1","article-title":"Ensemble adversarial training: Attacks and defenses","volume-title":"Proc. 6th Int. Conf. Learn. Representations","author":"Tram\u00e8r"},{"key":"ref31","first-page":"36246","article-title":"Better diffusion models further improve adversarial training","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Wang"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02330"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3516554"},{"key":"ref34","first-page":"1127","article-title":"Low frequency adversarial perturbation","volume-title":"Proc. Int. Conf. Uncertainty Artif. Intell.","author":"Guo"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.111088"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3202366"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3430508"},{"key":"ref38","article-title":"The MNIST database of handwritten digits","author":"LeCun","year":"1998"},{"key":"ref39","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"issue":"7","key":"ref40","article-title":"Tiny ImageNet visual recognition challenge","volume":"7","author":"Le","year":"2015"},{"key":"ref41","first-page":"1","article-title":"Very deep convolutional networks for large-scale image recognition","volume-title":"Proc. 3rd Int. Conf. Learn. Representations","author":"Simonyan"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.5244\/C.30.87"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_38"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.21105\/joss.02607"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00138"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00071"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00772"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11434575\/11269702.pdf?arnumber=11269702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T01:16:46Z","timestamp":1773710206000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11269702\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":48,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3637369","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3]]}}}