{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:45:53Z","timestamp":1775018753560,"version":"3.50.1"},"reference-count":14,"publisher":"Pleiades Publishing Ltd","issue":"3","license":[{"start":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:00:00Z","timestamp":1685059200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:00:00Z","timestamp":1685059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1134\/s0361768823030027","type":"journal-article","created":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T19:02:45Z","timestamp":1685041365000},"page":"187-191","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Augmenting the Training Set of Histological Images with Adversarial Examples"],"prefix":"10.1134","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7777-7035","authenticated-orcid":false,"given":"N. D.","family":"Lokshin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4217-7141","authenticated-orcid":false,"given":"A. V.","family":"Khvostikov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9910-4501","authenticated-orcid":false,"given":"A. S.","family":"Krylov","sequence":"additional","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2023,5,26]]},"reference":[{"key":"3735_CR1","unstructured":"Goodfellow, I.J., Shlens, J., and Szegedy, Ch., Explaining and harnessing adversarial examples, 2014."},{"key":"3735_CR2","doi-asserted-by":"crossref","unstructured":"Su, J., Vargas, D.V., and Sakurai, K., One pixel attack for fooling deep neural networks, IEEE Trans. Evol. Comput., 2019, no. 5, pp. 828\u2013841.","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"3735_CR3","doi-asserted-by":"crossref","unstructured":"Carlini, N. and Wagner, D., Towards evaluating the robustness of neural networks, Proc. IEEE Symp. Security and Privacy (SP), 2017, pp. 39\u201357.","DOI":"10.1109\/SP.2017.49"},{"key":"3735_CR4","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.-M., Fawzi, A., and Frossard, P., Deepfool: A simple and accurate method to fool deep neural networks, Proc. IEEE Conf. Computer Vision and Pattern Recognition, 2016, pp. 2574\u20132582.","DOI":"10.1109\/CVPR.2016.282"},{"key":"3735_CR5","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, Sh., and Sun, J., Deep residual learning for image recognition, Proc. IEEE Conf. Computer Vision and Pattern Recognition, 2016, pp. 770\u2013778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"3735_CR6","unstructured":"Kather, J.N., Halama, N., and Marx, A., 100 000 histological images of human colorectal cancer and healthy tissue, 2018."},{"key":"3735_CR7","doi-asserted-by":"crossref","unstructured":"Liang, B., Li, H., Su, M., Li, X., Shi, W., and Wang, X., Detecting adversarial image examples in deep neural networks with adaptive noise reduction, IEEE Trans. Dependable Secure Comput., 2018, no. 1, pp. 72\u201385.","DOI":"10.1109\/TDSC.2018.2874243"},{"key":"3735_CR8","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Wu, X., Jha, S., and Swami, A., Distillation as a defense to adversarial perturbations against deep neural networks, Proc. IEEE Symp. Security and Privacy (SP), 2016, pp. 582\u2013597.","DOI":"10.1109\/SP.2016.41"},{"key":"3735_CR9","doi-asserted-by":"crossref","unstructured":"Xiao, Ch., Li, B., Zhu, J.-Y., He, W., Liu, M., and Song, D., Generating adversarial examples with adversarial networks, 2018.","DOI":"10.24963\/ijcai.2018\/543"},{"key":"3735_CR10","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, Sh., Courville, A., and Bengio, Y., Generative adversarial nets, Advances in Neural Information Processing Systems, 2014."},{"key":"3735_CR11","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., and Vladu, A., Towards deep learning models resistant to adversarial attacks, 2017."},{"key":"3735_CR12","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen, J., and Aila, T., Analyzing and improving the image quality of stylegan, Proc. IEEE\/CVF Conf. Computer Vision and Pattern Recognition, 2020, pp. 8110\u20138119.","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"3735_CR13","doi-asserted-by":"crossref","unstructured":"Rony, J., Hafemann, L.G., Oliveira, L.S., Ayed, I.B., Sabourin, R., and Granger, E., Decoupling direction and norm for efficient gradient-based l2 adversarial attacks and defenses, Proc. IEEE\/CVF Conf. Computer Vision and Pattern Recognition, 2019, pp. 4322\u20134330.","DOI":"10.1109\/CVPR.2019.00445"},{"key":"3735_CR14","doi-asserted-by":"crossref","unstructured":"Khvostikov, A., Krylov, A., Mikhailov, I., Malkov, P., and Danilova, N., Tissue type recognition in whole slide histological images, 2021.","DOI":"10.20948\/graphicon-2021-3027-496-507"}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768823030027.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S0361768823030027","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768823030027.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:55:44Z","timestamp":1775012144000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S0361768823030027"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,26]]},"references-count":14,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["3735"],"URL":"https:\/\/doi.org\/10.1134\/s0361768823030027","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,26]]},"assertion":[{"value":"9 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 May 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}