{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:40:05Z","timestamp":1765546805145,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Outstanding Youth Science Program of National Natural Science Foundation of China","award":["61625202"],"award-info":[{"award-number":["61625202"]}]},{"name":"Open Fund of Science and Technology on Parallel and Distributed Processing Laboratory","award":["6142110200205"],"award-info":[{"award-number":["6142110200205"]}]},{"name":"Shenzhen Excellent Technological and Innovative Talent Training Foundation","award":["RCBS20200714114941176"],"award-info":[{"award-number":["RCBS20200714114941176"]}]},{"name":"International Cooperation and Exchange Key Program of National Natural Science Foundation of China","award":["61860206011"],"award-info":[{"award-number":["61860206011"]}]},{"name":"Project funded by China Postdoctoral Science Foundation","award":["2019M652758"],"award-info":[{"award-number":["2019M652758"]}]},{"name":"Hong Kong Scholars Program","award":["XJ2020032"],"award-info":[{"award-number":["XJ2020032"]}]},{"name":"National Key-Research and Development Program of China","award":["2020YFB2104003"],"award-info":[{"award-number":["2020YFB2104003"]}]},{"name":"National Youth Science Program of National Natural Science Foundation of China","award":["61902119"],"award-info":[{"award-number":["61902119"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,17]]},"DOI":"10.1145\/3474085.3475542","type":"proceedings-article","created":{"date-parts":[[2021,10,18]],"date-time":"2021-10-18T04:52:26Z","timestamp":1634532746000},"page":"264-272","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Towards Multiple Black-boxes Attack via Adversarial Example Generation Network"],"prefix":"10.1145","author":[{"given":"Duan","family":"Mingxing","sequence":"first","affiliation":[{"name":"Hunan University, Changhsha, China"}]},{"given":"Kenli","family":"Li","sequence":"additional","affiliation":[{"name":"Hunan University, Changhsha, China"}]},{"given":"Lingxi","family":"Xie","sequence":"additional","affiliation":[{"name":"Huawei Inc, Shenzhen, China"}]},{"given":"Qi","family":"Tian","sequence":"additional","affiliation":[{"name":"Huawei Inc, Shenzhen, China"}]},{"given":"Bin","family":"Xiao","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2021,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"AI-GAN: Attack-Inspired Generation of Adversarial Examples. arXiv preprint arXiv:2002.02196","author":"Bai Tao","year":"2020","unstructured":"Tao Bai , Jun Zhao , Jinlin Zhu , Shoudong Han , Jiefeng Chen , and Bo Li. 2020. AI-GAN: Attack-Inspired Generation of Adversarial Examples. arXiv preprint arXiv:2002.02196 ( 2020 ). Tao Bai, Jun Zhao, Jinlin Zhu, Shoudong Han, Jiefeng Chen, and Bo Li. 2020. AI-GAN: Attack-Inspired Generation of Adversarial Examples. arXiv preprint arXiv:2002.02196 (2020)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01258-8_10"},{"key":"e_1_3_2_1_3_1","volume-title":"International Conference on Learning Representations","author":"Brendel Wieland","year":"2018","unstructured":"Wieland Brendel , Jonas Rauber , and Matthias Bethge . 2018 . Decision-based adversarial attacks: Reliable attacks against black-box machine learning models . International Conference on Learning Representations (2018). Wieland Brendel, Jonas Rauber, and Matthias Bethge. 2018. Decision-based adversarial attacks: Reliable attacks against black-box machine learning models. International Conference on Learning Representations (2018)."},{"volume-title":"Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp)","author":"Carlini Nicholas","key":"e_1_3_2_1_4_1","unstructured":"Nicholas Carlini and David Wagner . 2017. Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp) . IEEE , 39--57. Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp). IEEE, 39--57."},{"volume-title":"2020 a. Hopskipjumpattack: A query-efficient decision-based attack. In 2020 ieee symposium on security and privacy (sp)","author":"Chen Jianbo","key":"e_1_3_2_1_5_1","unstructured":"Jianbo Chen , Michael I Jordan , and Martin J Wainwright . 2020 a. Hopskipjumpattack: A query-efficient decision-based attack. In 2020 ieee symposium on security and privacy (sp) . IEEE , 1277--1294. Jianbo Chen, Michael I Jordan, and Martin J Wainwright. 2020 a. Hopskipjumpattack: A query-efficient decision-based attack. In 2020 ieee symposium on security and privacy (sp). IEEE, 1277--1294."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58555-6_17"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.518"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_10_1","volume-title":"An interactive web-based dashboard to track COVID-19 in real time. The Lancet infectious diseases","author":"Dong Ensheng","year":"2020","unstructured":"Ensheng Dong , Hongru Du , and Lauren Gardner . 2020. An interactive web-based dashboard to track COVID-19 in real time. The Lancet infectious diseases , Vol. 20 , 5 ( 2020 ), 533--534. Ensheng Dong, Hongru Du, and Lauren Gardner. 2020. An interactive web-based dashboard to track COVID-19 in real time. The Lancet infectious diseases, Vol. 20, 5 (2020), 533--534."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00790"},{"key":"e_1_3_2_1_13_1","volume-title":"International Conference on Learning Representations","author":"Goodfellow Ian J","year":"2015","unstructured":"Ian J Goodfellow , Jonathon Shlens , and Christian Szegedy . 2015 . Explaining and harnessing adversarial examples . International Conference on Learning Representations (2015). Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and harnessing adversarial examples. International Conference on Learning Representations (2015)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/3454287.3454630"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00526"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/3298023.3298159"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_18_1","volume-title":"Science","volume":"349","author":"Hirschberg Julia","year":"2015","unstructured":"Julia Hirschberg and Christopher D Manning . 2015 . Advances in natural language processing . Science , Vol. 349 , 6245 (2015), 261--266. Julia Hirschberg and Christopher D Manning. 2015. Advances in natural language processing. Science, Vol. 349, 6245 (2015), 261--266."},{"key":"e_1_3_2_1_19_1","volume-title":"Black-box Adversarial Attacks with Limited Queries and Information. In International Conference on Machine Learning. 2137--2146","author":"Ilyas Andrew","year":"2018","unstructured":"Andrew Ilyas , Logan Engstrom , Anish Athalye , and Jessy Lin . 2018 . Black-box Adversarial Attacks with Limited Queries and Information. In International Conference on Machine Learning. 2137--2146 . Andrew Ilyas, Logan Engstrom, Anish Athalye, and Jessy Lin. 2018. Black-box Adversarial Attacks with Limited Queries and Information. In International Conference on Machine Learning. 2137--2146."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/3006374"},{"key":"e_1_3_2_1_21_1","volume-title":"Nature","volume":"521","author":"LeCun Yann","year":"2015","unstructured":"Yann LeCun , Yoshua Bengio , and Geoffrey Hinton . 2015 . Deep learning . Nature , Vol. 521 , 7553 (2015), 436--444. Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. Nature, Vol. 521, 7553 (2015), 436--444."},{"key":"e_1_3_2_1_22_1","volume-title":"International Conference on Machine Learning. 3866--3876","author":"Li Yandong","year":"2019","unstructured":"Yandong Li , Lijun Li , Liqiang Wang , Tong Zhang , and Boqing Gong . 2019 . NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks . In International Conference on Machine Learning. 3866--3876 . Yandong Li, Lijun Li, Liqiang Wang, Tong Zhang, and Boqing Gong. 2019. NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks. In International Conference on Machine Learning. 3866--3876."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the ICML 2021 Workshop on Adversarial Machine Learning","author":"Liu Fan","year":"2021","unstructured":"Fan Liu , Shuyu Zhao , Xuelong Dai , and Bin Xiao . 2021 . Long-term Cross Adversarial Training: A Robust Meta-learning Method for Few-shot Classification Tasks . In Proceedings of the ICML 2021 Workshop on Adversarial Machine Learning (2021). Fan Liu, Shuyu Zhao, Xuelong Dai, and Bin Xiao. 2021. Long-term Cross Adversarial Training: A Robust Meta-learning Method for Few-shot Classification Tasks. In Proceedings of the ICML 2021 Workshop on Adversarial Machine Learning (2021)."},{"key":"e_1_3_2_1_24_1","volume-title":"International Conference on Learning Representations","author":"Liu Yanpei","year":"2016","unstructured":"Yanpei Liu , Xinyun Chen , Chang Liu , and Dawn Song . 2016 . Delving into transferable adversarial examples and black-box attacks . International Conference on Learning Representations (2016). Yanpei Liu, Xinyun Chen, Chang Liu, and Dawn Song. 2016. Delving into transferable adversarial examples and black-box attacks. International Conference on Learning Representations (2016)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00034"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193209"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/FGR.2006.78"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-016-0940-3"},{"key":"e_1_3_2_1_32_1","volume-title":"International Conference on Learning Representations","author":"Simonyan Karen","year":"2015","unstructured":"Karen Simonyan and Andrew Zisserman . 2015 . Very deep convolutional networks for large-scale image recognition . International Conference on Learning Representations (2015). Karen Simonyan and Andrew Zisserman. 2015. Very deep convolutional networks for large-scale image recognition. International Conference on Learning Representations (2015)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969049"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/3489212.3489287"},{"key":"e_1_3_2_1_35_1","volume-title":"International Conference on Learning Representations","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . 2014 . Intriguing properties of neural networks . International Conference on Learning Representations (2014). Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. International Conference on Learning Representations (2014)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.3301742"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00042"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/3304222.3304312"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00031"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"}],"event":{"name":"MM '21: ACM Multimedia Conference","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Virtual Event China","acronym":"MM '21"},"container-title":["Proceedings of the 29th ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474085.3475542","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474085.3475542","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:49:10Z","timestamp":1750193350000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474085.3475542"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,17]]},"references-count":40,"alternative-id":["10.1145\/3474085.3475542","10.1145\/3474085"],"URL":"https:\/\/doi.org\/10.1145\/3474085.3475542","relation":{},"subject":[],"published":{"date-parts":[[2021,10,17]]},"assertion":[{"value":"2021-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}