{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:27Z","timestamp":1750220427950,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,25]],"date-time":"2020-12-25T00:00:00Z","timestamp":1608854400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Basic Research Project of Yunnan Province Regulation and Service","award":["202001BB050076"],"award-info":[{"award-number":["202001BB050076"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,25]]},"DOI":"10.1145\/3447450.3447455","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T03:16:35Z","timestamp":1618024595000},"page":"27-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["MI-FGSM on Faster R-CNN Object Detector"],"prefix":"10.1145","author":[{"given":"Zhenghao","family":"Liu","sequence":"first","affiliation":[{"name":"National Piolt School of software Yunnan University and Engineering research center of cyberspace, China"}]},{"given":"Wenyu","family":"Peng","sequence":"additional","affiliation":[{"name":"National Piolt School of software Yunnan University and Engineering research center of cyberspace, China"}]},{"given":"Jun","family":"Zhou","sequence":"additional","affiliation":[{"name":"National Piolt School of software Yunnan University and Engineering research center of cyberspace, China"}]},{"given":"Zifeng","family":"Wu","sequence":"additional","affiliation":[{"name":"National Piolt School of software Yunnan University and Engineering research center of cyberspace, China"}]},{"given":"Jintao","family":"Zhang","sequence":"additional","affiliation":[{"name":"National Piolt School of software Yunnan University and Engineering research center of cyberspace, China"}]},{"given":"Yunchun","family":"Zhang","sequence":"additional","affiliation":[{"name":"National Piolt School of software Yunnan University and Engineering research center of cyberspace, China"}]}],"member":"320","published-online":{"date-parts":[[2021,4,9]]},"reference":[{"volume-title":"A survey of deep neural network architectures and their applications. Neurocomputing, 234(APR.19):11\u201326","year":"2017","author":"Liu Weibo","key":"e_1_3_2_1_1_1"},{"volume-title":"Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems, 25(2)","year":"2012","author":"Krizhevsky Alex","key":"e_1_3_2_1_2_1"},{"volume-title":"Goingdeeper with convolutions","year":"2014","author":"Szegedy Christian","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Ross Girshick Jeff Donahue Trevor Darrell and Jitendra Malik. Rich feature hierarchies for accurate object detection and semantic segmentation. InCVPR 2014. Ross Girshick Jeff Donahue Trevor Darrell and Jitendra Malik. Rich feature hierarchies for accurate object detection and semantic segmentation. InCVPR 2014.","DOI":"10.1109\/CVPR.2014.81"},{"key":"e_1_3_2_1_5_1","first-page":"387","volume-title":"R-FCN: object detection via region-based fully convolutional networks","author":"Dai Jifeng","year":"2016"},{"volume-title":"IEEE Computer Society","year":"2017","author":"Lin Tsung-Yi","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","first-page":"209","article-title":"Detail preservation and feature refinement for object detection","volume":"359","author":"Li Ye","year":"2019","journal-title":"Neuro computing"},{"key":"e_1_3_2_1_8_1","first-page":"53","article-title":"Object detection for medical images","volume":"350","author":"Li Zhuoling","year":"2019","journal-title":"Neuro computing"},{"volume-title":"IEEE Computer Society","year":"2014","author":"Taigman Yaniv","key":"e_1_3_2_1_9_1"},{"first-page":"3426","volume-title":"Large-scale malware classification using random projections and neural networks","author":"Dahl George E.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Ronan Collobert and Jason Weston . A unified architecture for natural language processing: deep neural networks with multitask learning . volume 307 of ACM International Conference Proceeding Series pages 160\u2013 167 . ACM 2008. Ronan Collobert and Jason Weston. A unified architecture for natural language processing: deep neural networks with multitask learning. volume 307 of ACM International Conference Proceeding Series pages 160\u2013167. ACM 2008.","DOI":"10.1145\/1390156.1390177"},{"key":"e_1_3_2_1_12_1","unstructured":"Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian J. Goodfellow and Rob Fergus. Intriguing properties of neural networks.2014. Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian J. Goodfellow and Rob Fergus. Intriguing properties of neural networks.2014."},{"volume-title":"Explaining and harnessing adversarial examples","year":"2015","author":"Goodfellow Ian J.","key":"e_1_3_2_1_13_1"},{"volume-title":"ACM","year":"2016","author":"Sharif Mahmood","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46448-0_2"},{"volume-title":"IEEE Computer Society","year":"2017","author":"Xie Cihang","key":"e_1_3_2_1_18_1"},{"volume-title":"IEEE Computer Society","year":"2018","author":"Dong Yinpeng","key":"e_1_3_2_1_19_1"},{"volume-title":"Very deep convolutional networks for large-scale image recognition","year":"2015","author":"Simonyan Karen","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"volume-title":"IEEE Computer Society","year":"2016","author":"Redmon Joseph","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","first-page":"87","article-title":"Adversarial attacks on faster r-cnn object detector","volume":"382","author":"Wang Yutong","year":"2020","journal-title":"Neuro computing"},{"volume-title":"Towards deep learning models resistant to adversarial attacks. OpenReview.net","year":"2018","author":"Madry Aleksander","key":"e_1_3_2_1_24_1"},{"volume-title":"Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. CoRR, abs\/1605.07277","year":"2016","author":"Papernot Nicolas","key":"e_1_3_2_1_25_1"},{"volume-title":"ACM","year":"2017","author":"Papernot Nicolas","key":"e_1_3_2_1_26_1"},{"volume-title":"IEEE Computer Society","year":"2017","author":"Carlini Nicholas","key":"e_1_3_2_1_27_1"},{"volume-title":"IEEE","year":"2019","author":"Zhang Haichao","key":"e_1_3_2_1_28_1"},{"volume-title":"Robust adversarial perturbation on deep proposal-based models. page 231","year":"2018","author":"Li Yuezun","key":"e_1_3_2_1_29_1"}],"event":{"name":"ICVIP 2020: 2020 The 4th International Conference on Video and Image Processing","acronym":"ICVIP 2020","location":"Xi'an China"},"container-title":["2020 The 4th International Conference on Video and Image Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447450.3447455","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447450.3447455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:46:57Z","timestamp":1750193217000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447450.3447455"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,25]]},"references-count":29,"alternative-id":["10.1145\/3447450.3447455","10.1145\/3447450"],"URL":"https:\/\/doi.org\/10.1145\/3447450.3447455","relation":{},"subject":[],"published":{"date-parts":[[2020,12,25]]},"assertion":[{"value":"2021-04-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}