{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T05:13:02Z","timestamp":1747458782721},"reference-count":23,"publisher":"World Scientific Pub Co Pte Lt","issue":"02","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Wavelets Multiresolut Inf. Process."],"published-print":{"date-parts":[[2021,3]]},"abstract":"<jats:p> Deep neural networks are vulnerable to adversarial examples, which can fool models by adding carefully designed perturbations. An intriguing phenomenon is that adversarial examples often exhibit transferability, thus making black-box attacks effective in real-world applications. However, the adversarial examples generated by existing methods typically overfit the structure and feature representation of the source model, resulting in a low success rate in a black-box manner. To address this issue, we propose the multi-scale feature attack to boost attack transferability, which adjusts the internal feature space representation of the adversarial image to get far to the internal representation of the original image. We show that we can select a low-level layer and a high-level layer of the source model to conduct the perturbations, and the crafted adversarial examples are confused with original images, not just in the class but also in the feature space representations. To further improve the transferability of adversarial examples, we apply reverse cross-entropy loss to reduce the overfitting further and show that it is effective for attacking adversarially trained models with strong defensive ability. Extensive experiments show that the proposed methods consistently outperform the iterative fast gradient sign method (IFGSM) and momentum iterative fast gradient sign method (MIFGSM) under the challenging black-box setting. <\/jats:p>","DOI":"10.1142\/s0219691320500769","type":"journal-article","created":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T08:03:51Z","timestamp":1603872231000},"page":"2050076","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing adversarial attack transferability with multi-scale feature attack"],"prefix":"10.1142","volume":"19","author":[{"given":"Caixia","family":"Sun","sequence":"first","affiliation":[{"name":"School of Electronic Information, Wuhan University, Wuhan 430072, P. R. China"}]},{"given":"Lian","family":"Zou","sequence":"additional","affiliation":[{"name":"School of Electronic Information, Wuhan University, Wuhan 430072, P. R. China"}]},{"given":"Cien","family":"Fan","sequence":"additional","affiliation":[{"name":"School of Electronic Information, Wuhan University, Wuhan 430072, P. R. China"}]},{"given":"Yu","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Electronic Information, Wuhan University, Wuhan 430072, P. R. China"}]},{"given":"Yifeng","family":"Liu","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Public Safety, Risk Perception and Control by Big Data (NEL-PSRPC), Beijing 100041, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2020,12,4]]},"reference":[{"key":"S0219691320500769BIB003","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"S0219691320500769BIB005","first-page":"4751","volume-title":"Adv. Neural Inform. Process. Syst.","volume":"32","author":"Diakonikolas I.","year":"2019"},{"key":"S0219691320500769BIB006","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"S0219691320500769BIB010","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"S0219691320500769BIB011","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_38"},{"key":"S0219691320500769BIB012","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"S0219691320500769BIB013","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00723"},{"issue":"6","key":"S0219691320500769BIB016","first-page":"1097","volume":"60","author":"Krizhevsky A.","year":"2012","journal-title":"Adv. Neural Inform. Process. Syst."},{"key":"S0219691320500769BIB019","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94042-7_11"},{"key":"S0219691320500769BIB021","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462334"},{"key":"S0219691320500769BIB022","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00191"},{"key":"S0219691320500769BIB026","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00025"},{"key":"S0219691320500769BIB027","doi-asserted-by":"publisher","DOI":"10.1145\/3194085.3194087"},{"issue":"10","key":"S0219691320500769BIB028","first-page":"2452","volume":"41","author":"Reddy M. K.","year":"2018","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"S0219691320500769BIB029","first-page":"1660","volume-title":"Thirty-Second AAAI Conf. Artificial Intelligence","author":"Ross A. S.","year":"2018"},{"key":"S0219691320500769BIB030","volume-title":"4th International Conference on Learning Representations","author":"Sabour S."},{"key":"S0219691320500769BIB032","first-page":"4278","volume-title":"Thirty-First AAAI Conf. Artificial Intelligence","author":"Szegedy C.","year":"2017"},{"key":"S0219691320500769BIB033","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"S0219691320500769BIB038","first-page":"3320","volume":"27","author":"Yosinski J.","year":"2014","journal-title":"Adv. Neural Inform. Process. Syst."},{"key":"S0219691320500769BIB039","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"S0219691320500769BIB040","doi-asserted-by":"publisher","DOI":"10.1145\/3178115"},{"key":"S0219691320500769BIB041","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.319"},{"key":"S0219691320500769BIB042","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01264-9_28"}],"container-title":["International Journal of Wavelets, Multiresolution and Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219691320500769","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,15]],"date-time":"2021-03-15T08:28:18Z","timestamp":1615796898000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219691320500769"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,4]]},"references-count":23,"journal-issue":{"issue":"02","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10.1142\/S0219691320500769"],"URL":"https:\/\/doi.org\/10.1142\/s0219691320500769","relation":{},"ISSN":["0219-6913","1793-690X"],"issn-type":[{"value":"0219-6913","type":"print"},{"value":"1793-690X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,4]]}}}