{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T09:04:55Z","timestamp":1775552695870,"version":"3.50.1"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Singapore Ministry of Education AcRF Tier 2","award":["MOE-T2EP20222-0009"],"award-info":[{"award-number":["MOE-T2EP20222-0009"]}]},{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","award":["AISG-100E-2020-065"],"award-info":[{"award-number":["AISG-100E-2020-065"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"name":"SUTD SKI","award":["SKI 2021_02_06"],"award-info":[{"award-number":["SKI 2021_02_06"]}]},{"name":"TAILOR"},{"name":"EU Horizon 2020 research and innovation programme","award":["952215"],"award-info":[{"award-number":["952215"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Pattern Anal. Mach. Intell."],"published-print":{"date-parts":[[2023,9,1]]},"DOI":"10.1109\/tpami.2023.3263619","type":"journal-article","created":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T17:39:53Z","timestamp":1680284393000},"page":"11374-11381","source":"Crossref","is-referenced-by-count":10,"title":["GradMDM: Adversarial Attack on Dynamic Networks"],"prefix":"10.1109","volume":"45","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6530-8212","authenticated-orcid":false,"given":"Jianhong","family":"Pan","sequence":"first","affiliation":[{"name":"Information Systems Technology and Design pillar, Singapore University of Technology and Design, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6082-6002","authenticated-orcid":false,"given":"Lin Geng","family":"Foo","sequence":"additional","affiliation":[{"name":"Information Systems Technology and Design pillar, Singapore University of Technology and Design, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3490-0333","authenticated-orcid":false,"given":"Qichen","family":"Zheng","sequence":"additional","affiliation":[{"name":"Information Systems Technology and Design pillar, Singapore University of Technology and Design, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9386-717X","authenticated-orcid":false,"given":"Zhipeng","family":"Fan","sequence":"additional","affiliation":[{"name":"Tandon School of Engineering, New York University, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1920-0371","authenticated-orcid":false,"given":"Hossein","family":"Rahmani","sequence":"additional","affiliation":[{"name":"School of Computing and Communications, Lancaster University, Lancaster, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9998-3614","authenticated-orcid":false,"given":"Qiuhong","family":"Ke","sequence":"additional","affiliation":[{"name":"Department of Data Science and AI, Monash University, Clayton, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4365-4165","authenticated-orcid":false,"given":"Jun","family":"Liu","sequence":"additional","affiliation":[{"name":"Information Systems Technology and Design pillar, Singapore University of Technology and Design, Singapore"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"ref57","article-title":"Keeping the bad guys out: Protecting and vaccinating deep learning with JPEG compression","author":"das","year":"2017"},{"key":"ref12","first-page":"21","article-title":"SSD: Single shot multibox detector","author":"liu","year":"2016","journal-title":"Proc Eur Conf Comput Vis"},{"key":"ref56","article-title":"Feature squeezing: Detecting adversarial examples in deep neural networks","author":"xu","year":"2017"},{"key":"ref15","first-page":"5998","article-title":"Attention is all you need","author":"vaswani","year":"2017","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737614"},{"key":"ref14","first-page":"213","article-title":"End-to-end object detection with transformers","author":"carion","year":"2020","journal-title":"Proc IEEE Int Conf Comput Vis"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-014-1242-6"},{"key":"ref53","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014"},{"key":"ref52","first-page":"2366","article-title":"Image quality metrics: PSNR versus SSIM","author":"hore","year":"2010","journal-title":"Proc 20th Int Conf Pattern Recognit"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"ref55","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2017"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"ref54","article-title":"The caltech-ucsd birds-200&#x2013;2011 dataset","author":"wah","year":"2011"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1700789"},{"key":"ref16","article-title":"A survey of model compression and acceleration for deep neural networks","author":"cheng","year":"2017"},{"key":"ref19","first-page":"420","article-title":"SkipNet: Learning dynamic routing in convolutional networks","author":"wang","year":"2018","journal-title":"Proc 15th Eur Conf"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3117837"},{"key":"ref51","article-title":"Learning multiple layers of features from tiny images","author":"krizhevsky","year":"2009"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00850"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6025"},{"key":"ref48","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00529"},{"key":"ref41","article-title":"IamNN: Iterative and adaptive mobile neural network for efficient image classification","author":"leroux","year":"2018"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00222"},{"key":"ref43","article-title":"Any-precision deep neural networks","author":"yu","year":"2019"},{"key":"ref49","article-title":"Multi-criteria decision analysis for supporting the selection of engineering materials in product design","author":"jahan","year":"2016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2644615"},{"key":"ref7","first-page":"234","article-title":"U-Net: Convolutional networks for biomedical image segmentation","author":"ronneberger","year":"2015","journal-title":"Proc Med Image Comput Comput -Assist Interv"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2699184"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"ref3","article-title":"An image is worth 16x16 words: Transformers for image recognition at scale","author":"dosovitskiy","year":"2021","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19772-7_37"},{"key":"ref35","article-title":"Estimating or propagating gradients through stochastic neurons for conditional computation","author":"bengio","year":"2013"},{"key":"ref34","first-page":"1884","article-title":"Channel gating neural networks","author":"hua","year":"2019","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref37","article-title":"Conditional computation in neural networks for faster models","author":"bengio","year":"2015"},{"key":"ref36","article-title":"Exponentially increasing the capacity-to-computation ratio for conditional computation in deep learning","author":"cho","year":"2014"},{"key":"ref31","first-page":"11960","article-title":"Not all images are worth 16x16 words: Dynamic transformers for efficient image recognition","author":"wang","year":"2021","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00609"},{"key":"ref33","first-page":"3301","article-title":"Shallow-deep networks: Understanding and mitigating network overthinking","author":"kaya","year":"2019","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01054"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref39","article-title":"A panda? no, it's a sloth: Slowdown attacks on adaptive multi-exit neural network inference","author":"hong","year":"2021","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref38","first-page":"2181","article-title":"Runtime neural pruning","author":"lin","year":"2017","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref24","first-page":"1305","article-title":"CondConv: Conditionally parameterized convolutions for efficient inference","author":"yang","year":"2019","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01246-5_1"},{"key":"ref26","article-title":"Multi-scale dense networks for resource efficient image classification","author":"huang","year":"2018","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00858"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.194"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01427"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00498"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11630"},{"key":"ref27","article-title":"Adaptive computation time for recurrent neural networks","author":"graves","year":"2016"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00919"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2004.1276868"}],"container-title":["IEEE Transactions on Pattern Analysis and Machine Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/34\/10210213\/10089510.pdf?arnumber=10089510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T17:55:26Z","timestamp":1693245326000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10089510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,1]]},"references-count":60,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tpami.2023.3263619","relation":{},"ISSN":["0162-8828","2160-9292","1939-3539"],"issn-type":[{"value":"0162-8828","type":"print"},{"value":"2160-9292","type":"electronic"},{"value":"1939-3539","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,1]]}}}