{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T08:27:10Z","timestamp":1775118430886,"version":"3.50.1"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100019091","name":"Key Research and Development Program of Shandong Province, China","doi-asserted-by":"publisher","award":["2025CXGC010113"],"award-info":[{"award-number":["2025CXGC010113"]}],"id":[{"id":"10.13039\/501100019091","id-type":"DOI","asserted-by":"publisher"}]},{"name":"China Post-Doctoral Science Foundation","award":["2023M732022"],"award-info":[{"award-number":["2023M732022"]}]},{"name":"Science, Technology and Innovation Commission of Shenzhen Municipality","award":["KJZD20230923115759015"],"award-info":[{"award-number":["KJZD20230923115759015"]}]},{"name":"Project of Distinguished Scientist Fellowship Program of Princess Nourah bint Abdulrahman University","award":["HCPNU2025R54"],"award-info":[{"award-number":["HCPNU2025R54"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tifs.2025.3648551","type":"journal-article","created":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T18:25:19Z","timestamp":1766687119000},"page":"854-869","source":"Crossref","is-referenced-by-count":1,"title":["Towards Patch-Based Noise Compression for Adversarial Attack Against Transformer-Based Visual Tracking"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2230-3937","authenticated-orcid":false,"given":"Peng","family":"Gao","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Qufu Normal University, Qufu, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3873-106X","authenticated-orcid":false,"given":"Long","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Qufu Normal University, Qufu, Shandong, China"}]},{"given":"Wen-Jia","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Qufu Normal University, Qufu, Shandong, China"}]},{"given":"Fei","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Integrated Circuits, Harbin Institute of Technology Shenzhen, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5256-210X","authenticated-orcid":false,"given":"Hamido","family":"Fujita","sequence":"additional","affiliation":[{"name":"Malaysia&#x2013;Japan International Institute of Technology, University Teknologi Malaysia, Kuala Lumpur, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6042-0283","authenticated-orcid":false,"given":"Hanan","family":"Aljuaid","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia"}]},{"given":"Ru-Yue","family":"Yuan","sequence":"additional","affiliation":[{"name":"resides in Jining, Shandong, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"An image is worth 16\u00d716 words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2020","journal-title":"arXiv:2010.11929"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00520"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00041"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00717"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2105.07581"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3156809"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01007"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00664"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20047-2_20"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01028"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00803"},{"key":"ref13","first-page":"58736","article-title":"MixFormerV2: Efficient fully transformer tracking","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Cui"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2957464"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01246-5_19"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-020-01387-y"},{"key":"ref17","first-page":"10347","article-title":"Training data-efficient image transformers & distillation through attention","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Touvron"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00060"},{"key":"ref19","first-page":"15908","article-title":"Transformer in transformer","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Han"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00010"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00009"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/ac9830"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00063"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3512527.3531415"},{"key":"ref25","article-title":"DeepViT: Towards deeper vision transformer","author":"Zhou","year":"2021","journal-title":"arXiv:2103.11886"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25085-9_26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00162"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00303"},{"key":"ref29","first-page":"16743","article-title":"SwinTrack: A simple and strong baseline for transformer tracking","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Lin"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3249468"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i1.25155"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00935"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00162"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00859"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00853"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20047-2_9"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00971"},{"key":"ref38","article-title":"TrTr: Visual tracking with transformer","author":"Zhao","year":"2021","journal-title":"arXiv:2105.03817"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3232535"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/127"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00320"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20047-2_22"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10094971"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02186"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01792"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01399"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01400"},{"key":"ref48","article-title":"Blocking transferability of adversarial examples in black-box learning systems","author":"Hosseini","year":"2017","journal-title":"arXiv:1703.04318"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00790"},{"key":"ref52","first-page":"2137","article-title":"Black-box adversarial attacks with limited queries and information","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ilyas"},{"key":"ref53","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv:1312.6199"},{"key":"ref54","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref55","first-page":"284","article-title":"Synthesizing robust adversarial examples","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Athalye"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/543"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01971"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2024.3425655"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3519803"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2023.3276331"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01019"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00107"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58529-7_5"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109629"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/11313711\/11316104.pdf?arnumber=11316104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T21:03:55Z","timestamp":1770671035000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11316104\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3648551","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}