{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:14Z","timestamp":1750220894320,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:00:00Z","timestamp":1576800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,20]]},"DOI":"10.1145\/3376067.3376112","type":"proceedings-article","created":{"date-parts":[[2020,2,26]],"date-time":"2020-02-26T07:38:38Z","timestamp":1582702718000},"page":"84-89","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Generative Transferable Adversarial Attack"],"prefix":"10.1145","author":[{"given":"Yifeng","family":"Li","sequence":"first","affiliation":[{"name":"Cooperative Medianet, Innovation Center, Shanghai Jiao Tong University, China"}]},{"given":"Ya","family":"Zhang","sequence":"additional","affiliation":[{"name":"Cooperative Medianet, Innovation Center, Shanghai Jiao Tong University, China"}]},{"given":"Rui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"given":"Yanfeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Cooperative Medianet, Innovation Center, Shanghai Jiao Tong University, China"}]}],"member":"320","published-online":{"date-parts":[[2020,2,25]]},"reference":[{"volume-title":"AAAI Conference on Artificial Intelligence (AAAI).","author":"Baluja S.","key":"e_1_3_2_1_1_1","unstructured":"Baluja , S. and Fischer , I . 2018. Learning to Attack: Adversarial Transformation Networks . In AAAI Conference on Artificial Intelligence (AAAI). Baluja, S. and Fischer, I. 2018. Learning to Attack: Adversarial Transformation Networks. In AAAI Conference on Artificial Intelligence (AAAI)."},{"volume-title":"Towards Evaluating the Robustness of Neural Networks. In IEEE Symposium on Security and Privacy (S&P).","author":"Carlini N.","key":"e_1_3_2_1_2_1","unstructured":"Carlini , N. and Wagner , D . 2017 . Towards Evaluating the Robustness of Neural Networks. In IEEE Symposium on Security and Privacy (S&P). Carlini, N. and Wagner, D. 2017. Towards Evaluating the Robustness of Neural Networks. In IEEE Symposium on Security and Privacy (S&P)."},{"volume-title":"Encoder-Decoder with Atrous Separable Convolution for Semantic Image Segmentation. In European Conference on Computer Vision (ECCV).","author":"Chen L.","key":"e_1_3_2_1_3_1","unstructured":"Chen , L. , Zhu , Y. , Papandreou , G. , Schroff , F. , and Adam , H . 2018 . Encoder-Decoder with Atrous Separable Convolution for Semantic Image Segmentation. In European Conference on Computer Vision (ECCV). Chen, L., Zhu, Y., Papandreou, G., Schroff, F., and Adam, H. 2018. Encoder-Decoder with Atrous Separable Convolution for Semantic Image Segmentation. In European Conference on Computer Vision (ECCV)."},{"volume-title":"Boosting Adversarial Attacks with Momentum. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Dong Y.","key":"e_1_3_2_1_4_1","unstructured":"Dong , Y. , Liao , F. , Pang , T. , Su , H. , Zhu , J. , Hu , X. , and Li , J . 2018 . Boosting Adversarial Attacks with Momentum. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Dong, Y., Liao, F., Pang, T., Su, H., Zhu, J., Hu, X., and Li, J. 2018. Boosting Adversarial Attacks with Momentum. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR)."},{"volume-title":"Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations (ICLR).","author":"Goodfellow I.","key":"e_1_3_2_1_5_1","unstructured":"Goodfellow , I. , Shlens , J. , and Szegedy , C . 2015 . Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations (ICLR). Goodfellow, I., Shlens, J., and Szegedy, C. 2015. Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations (ICLR)."},{"volume-title":"Deep Residual Learning for Image Recognition. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","author":"He K.","key":"e_1_3_2_1_6_1","unstructured":"He , K. , Zhang , X. , Ren , S. , and Sun , J . 2016 . Deep Residual Learning for Image Recognition. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). He, K., Zhang, X., Ren, S., and Sun, J. 2016. Deep Residual Learning for Image Recognition. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR)."},{"volume-title":"Densely Connected Convolutional Networks. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Huang G.","key":"e_1_3_2_1_7_1","unstructured":"Huang , G. , Liu , Z. , and Weinberger , K . 2017 . Densely Connected Convolutional Networks. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Huang, G., Liu, Z., and Weinberger, K. 2017. Densely Connected Convolutional Networks. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR)."},{"volume-title":"Feature Space Perturbations Yield More Transferable Adversarial Examples. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Inkawhich N.","key":"e_1_3_2_1_8_1","unstructured":"Inkawhich , N. , Wen , W. , Li , H. , and Chen , Y . 2019 . Feature Space Perturbations Yield More Transferable Adversarial Examples. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Inkawhich, N., Wen, W., Li, H., and Chen, Y. 2019. Feature Space Perturbations Yield More Transferable Adversarial Examples. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR)."},{"volume-title":"Image-to-Image Translation with Conditional Adversarial Networks. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Isola P.","key":"e_1_3_2_1_9_1","unstructured":"Isola , P. , Zhu , J. , Zhou , T. , and Efros , A . 2016 . Image-to-Image Translation with Conditional Adversarial Networks. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Isola, P., Zhu, J., Zhou, T., and Efros, A. 2016. Image-to-Image Translation with Conditional Adversarial Networks. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR)."},{"volume-title":"Perceptual Losses for Real-Time Style Transfer and Super-Resolution. In European Conference on Computer Vision (ECCV).","author":"Johnson J.","key":"e_1_3_2_1_10_1","unstructured":"Johnson , J. , Alahi , A. , and Fei-Fei , L . 2016 . Perceptual Losses for Real-Time Style Transfer and Super-Resolution. In European Conference on Computer Vision (ECCV). Johnson, J., Alahi, A., and Fei-Fei, L. 2016. Perceptual Losses for Real-Time Style Transfer and Super-Resolution. In European Conference on Computer Vision (ECCV)."},{"volume-title":"International Conference on Learning Representations (ICLR) Workshop.","author":"Kurakin A.","key":"e_1_3_2_1_11_1","unstructured":"Kurakin , A. , Goodfellow , I. , and Bengio , S . 2017. Adversarial examples in the physical world . In International Conference on Learning Representations (ICLR) Workshop. Kurakin, A., Goodfellow, I., and Bengio, S. 2017. Adversarial examples in the physical world. In International Conference on Learning Representations (ICLR) Workshop."},{"volume-title":"Defense Against Adversarial Attacks Using High-Level Representation Guided Denoiser. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Liao F.","key":"e_1_3_2_1_12_1","unstructured":"Liao , F. , Liang , M. , Dong , Y. , Pang , T. , Zhu , J. , and Hu , X . 2018 . Defense Against Adversarial Attacks Using High-Level Representation Guided Denoiser. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Liao, F., Liang, M., Dong, Y., Pang, T., Zhu, J., and Hu, X. 2018. Defense Against Adversarial Attacks Using High-Level Representation Guided Denoiser. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR)."},{"volume-title":"International Conference on Learning Representations (ICLR).","author":"Liu Y.","key":"e_1_3_2_1_13_1","unstructured":"Liu , Y. , Chen , X. , Liu , C. , and Song , D . 2016. Delving into Transferable Adversarial Examples and Black-box Attacks . In International Conference on Learning Representations (ICLR). Liu, Y., Chen, X., Liu, C., and Song, D. 2016. Delving into Transferable Adversarial Examples and Black-box Attacks. In International Conference on Learning Representations (ICLR)."},{"volume-title":"Generative Adversarial Perturbations. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Poursaeed O.","key":"e_1_3_2_1_14_1","unstructured":"Poursaeed , O. , Katsman , I. , Gao , B. , and Belongie , S . 2017 . Generative Adversarial Perturbations. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Poursaeed, O., Katsman, I., Gao, B., and Belongie, S. 2017. Generative Adversarial Perturbations. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"volume-title":"Very Deep Convolutional Networks for Large-Scale Image Recognition. In International Conference on Learning Representations (ICLR).","author":"Simonyan K.","key":"e_1_3_2_1_17_1","unstructured":"Simonyan , K. and Zisserman , A . 2015 . Very Deep Convolutional Networks for Large-Scale Image Recognition. In International Conference on Learning Representations (ICLR). Simonyan, K. and Zisserman, A. 2015. Very Deep Convolutional Networks for Large-Scale Image Recognition. In International Conference on Learning Representations (ICLR)."},{"volume-title":"International Conference on Learning Representations (ICLR).","author":"Szegedy C.","key":"e_1_3_2_1_18_1","unstructured":"Szegedy , C. , Zaremba , W. , Sutskever , I. , Bruna , J. , Erhan , D. , Goodfellow , I. , and Fergus , R . 2014. Intriguing properties of neural networks . In International Conference on Learning Representations (ICLR). Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., and Fergus, R. 2014. Intriguing properties of neural networks. In International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_19_1","unstructured":"Yosinski J. Clune J. Bengio Y. and Lipson H. 2014. How transferable are features in deep neural networks?. In Neural Information Processing Systems (NeurIPS).  Yosinski J. Clune J. Bengio Y. and Lipson H. 2014. How transferable are features in deep neural networks?. In Neural Information Processing Systems (NeurIPS)."},{"volume-title":"Transferable Adversarial Perturbations. In European Conference on Computer Vision (ECCV).","author":"Zhou W.","key":"e_1_3_2_1_20_1","unstructured":"Zhou , W. , Hou , X. , Chen , Y. , Tang , M. , Huang , X. , Gan , X. , and Yang , Y . 2018 . Transferable Adversarial Perturbations. In European Conference on Computer Vision (ECCV). Zhou, W., Hou, X., Chen, Y., Tang, M., Huang, X., Gan, X., and Yang, Y. 2018. Transferable Adversarial Perturbations. In European Conference on Computer Vision (ECCV)."},{"volume-title":"Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks. In IEEE International Conference on Computer Vision (ICCV).","author":"Zhu J.","key":"e_1_3_2_1_21_1","unstructured":"Zhu , J. , Park , T. , Isola , P. , and Efros , A . 2017 . Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks. In IEEE International Conference on Computer Vision (ICCV). Zhu, J., Park, T., Isola, P., and Efros, A. 2017. Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks. In IEEE International Conference on Computer Vision (ICCV)."}],"event":{"name":"ICVIP 2019: 2019 the 3rd International Conference on Video and Image Processing","sponsor":["Shanghai Jiao Tong University Shanghai Jiao Tong University","Xidian University","TU Tianjin University"],"location":"Shanghai China","acronym":"ICVIP 2019"},"container-title":["Proceedings of the 3rd International Conference on Video and Image Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3376067.3376112","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3376067.3376112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:34Z","timestamp":1750203874000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3376067.3376112"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,20]]},"references-count":21,"alternative-id":["10.1145\/3376067.3376112","10.1145\/3376067"],"URL":"https:\/\/doi.org\/10.1145\/3376067.3376112","relation":{},"subject":[],"published":{"date-parts":[[2019,12,20]]},"assertion":[{"value":"2020-02-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}