{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T08:46:02Z","timestamp":1775205962360,"version":"3.50.1"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Central Government Guided Local Funds for Science and Technology Development","award":["216Z0301G"],"award-info":[{"award-number":["216Z0301G"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61379065"],"award-info":[{"award-number":["61379065"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Hebei province in China","award":["F2019203285"],"award-info":[{"award-number":["F2019203285"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Multimedia"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tmm.2022.3173533","type":"journal-article","created":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T19:36:57Z","timestamp":1652211417000},"page":"4296-4306","source":"Crossref","is-referenced-by-count":16,"title":["A Transferable Adversarial Belief Attack With Salient Region Perturbation Restriction"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3377-7209","authenticated-orcid":false,"given":"Shihui","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering, Yanshan University, Qinhuangdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2578-9071","authenticated-orcid":false,"given":"Dongxu","family":"Zuo","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Yanshan University, Qinhuangdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9224-6064","authenticated-orcid":false,"given":"Yongliang","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Yanshan University, Qinhuangdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2503-1976","authenticated-orcid":false,"given":"Xiaowei","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Yanshan University, Qinhuangdao, China"}]}],"member":"263","reference":[{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00031"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref12","article-title":"Transferability in machine learning: From phenomena to black-box attacks using adversarial samples","author":"papernot","year":"2016"},{"key":"ref37","first-page":"1","article-title":"Delving into transferable adversarial examples and black-box attacks","author":"liu","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00284"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_38"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref31","first-page":"1310","article-title":"Certified adversarial robustness via randomized smoothing","author":"cohen","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00624"},{"key":"ref33","article-title":"Learning multiple layers of features from tiny images","author":"krizhevsky","year":"2009"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00045"},{"key":"ref32","first-page":"306","article-title":"Gradient-based learning applied to document recognition","author":"lecun","year":"2001","journal-title":"Intell Signal Process"},{"key":"ref10","first-page":"1","article-title":"Query-efficient hard-label black-box attack: An optimization-based approach","author":"cheng","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref2","first-page":"1","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref1","first-page":"1","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref17","first-page":"1","article-title":"Nesterov accelerated gradient and scale invariance for adversarial attacks","author":"lin","year":"0","journal-title":"Proc 8th Int Conf Learn Representations"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00444"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"3807","DOI":"10.1109\/TMM.2021.3108009","article-title":"Pasadena: Perceptually aware and stealthy adversarial denoise attack","volume":"24","author":"cheng","year":"2021","journal-title":"IEEE Trans Multimedia"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2021.3079723"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref23","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"0","journal-title":"Proc Adv Neural Informat Process Syst"},{"key":"ref26","article-title":"Countering adversarial images using input transformations","author":"guo","year":"0","journal-title":"Proc 6th Int Conf Learn Representations"},{"key":"ref25","first-page":"1","article-title":"Ensemble adversarial training: Attacks and defenses","author":"tram\u00e8r","year":"0","journal-title":"Proc 6th Int Conf Learn Representations"},{"key":"ref20","first-page":"18795","article-title":"Adabelief optimizer: Adapting stepsizes by the belief in observed gradients","author":"zhuang","year":"2020","journal-title":"Proc Adv Neural Informat Process Syst"},{"key":"ref22","first-page":"949","article-title":"Natural evolution strategies","volume":"15","author":"wierstra","year":"2014","journal-title":"J Mach Learn Res"},{"key":"ref21","first-page":"543","article-title":"A method for unconstrained convex minimization problem with the rate of convergence $ o(1\/k^{2})$","volume":"269","author":"nesterov","year":"1983","journal-title":"Doklady an USSR"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00191"},{"key":"ref27","first-page":"1","article-title":"Mitigating adversarial effects through randomization","author":"xie","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00095"},{"key":"ref8","first-page":"1","article-title":"Prior convictions: Black-box adversarial attacks with bandits and priors","author":"ilyas","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref7","first-page":"2137","article-title":"Black-box adversarial attacks with limited queries and information","author":"ilyas","year":"0","journal-title":"Int Conf Mach Learn"},{"key":"ref9","first-page":"1","article-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models","author":"brendel","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref4","first-page":"1","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"}],"container-title":["IEEE Transactions on Multimedia"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6046\/10016790\/09772350.pdf?arnumber=9772350","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T19:51:51Z","timestamp":1699300311000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9772350\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/tmm.2022.3173533","relation":{},"ISSN":["1520-9210","1941-0077"],"issn-type":[{"value":"1520-9210","type":"print"},{"value":"1941-0077","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}