{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:00:53Z","timestamp":1750309253097,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T00:00:00Z","timestamp":1720915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62306225"],"award-info":[{"award-number":["62306225"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Basic and Applied Basic Research Foundation","award":["2021A151511073","2022A1515011297","202201011236"],"award-info":[{"award-number":["2021A151511073","2022A1515011297","202201011236"]}]},{"name":"Guangdong High-level Innovation Research Institution Project","award":["2021B0909050008"],"award-info":[{"award-number":["2021B0909050008"]}]},{"name":"Guangzhou Key Research and Development Program","award":["202206030003"],"award-info":[{"award-number":["202206030003"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,14]]},"DOI":"10.1145\/3638529.3654231","type":"proceedings-article","created":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T16:33:04Z","timestamp":1720456384000},"page":"449-457","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Pixel Logo Attack: Embedding Attacks as Logo-Like Pixels"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-7037-382X","authenticated-orcid":false,"given":"Jiang","family":"Zhu","sequence":"first","affiliation":[{"name":"Xidian University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4031-8609","authenticated-orcid":false,"given":"Hong","family":"Zhao","sequence":"additional","affiliation":[{"name":"Xidian University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0980-9316","authenticated-orcid":false,"given":"He","family":"Yu","sequence":"additional","affiliation":[{"name":"Xidian University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6834-5350","authenticated-orcid":false,"given":"Jing","family":"Liu","sequence":"additional","affiliation":[{"name":"Xidian University, Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,14]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556, 2014."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_2_1","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_3_1","first-page":"6105","volume-title":"International conference on machine learning","author":"Tan Mingxing","year":"2019","unstructured":"Mingxing Tan and Quoc Le. Efficientnet: Rethinking model scaling for convolutional neural networks. In International conference on machine learning, pages 6105--6114. PMLR, 2019."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_4_1","DOI":"10.1109\/CVPR.2019.00065"},{"key":"e_1_3_2_2_5_1","first-page":"4571","article-title":"A unified model for multi-class anomaly detection","volume":"35","author":"You Zhiyuan","year":"2022","unstructured":"Zhiyuan You, Lei Cui, Yujun Shen, Kai Yang, Xin Lu, Yu Zheng, and Xinyi Le. A unified model for multi-class anomaly detection. Advances in Neural Information Processing Systems, 35:4571--4584, 2022.","journal-title":"Advances in Neural Information Processing Systems"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_6_1","DOI":"10.1137\/1.9781611977653.ch78"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_7_1","DOI":"10.1109\/CVPR46437.2021.00283"},{"key":"e_1_3_2_2_8_1","volume-title":"Resnet strikes back: An improved training procedure in timm. arXiv preprint arXiv:2110.00476","author":"Wightman Ross","year":"2021","unstructured":"Ross Wightman, Hugo Touvron, and Herv\u00e9 J\u00e9gou. Resnet strikes back: An improved training procedure in timm. arXiv preprint arXiv:2110.00476, 2021."},{"key":"e_1_3_2_2_9_1","volume-title":"How to train your vit? data, augmentation, and regularization in vision transformers. arXiv preprint arXiv:2106.10270","author":"Steiner Andreas","year":"2021","unstructured":"Andreas Steiner, Alexander Kolesnikov, Xiaohua Zhai, Ross Wightman, Jakob Uszkoreit, and Lucas Beyer. How to train your vit? data, augmentation, and regularization in vision transformers. arXiv preprint arXiv:2106.10270, 2021."},{"key":"e_1_3_2_2_10_1","volume-title":"Language models are few-shot learners. Advances in neural information processing systems, 33:1877--1901","author":"Brown Tom","year":"2020","unstructured":"Tom Brown, Benjamin Mann, Nick Ryder, Melanie Subbiah, Jared D Kaplan, Prafulla Dhariwal, Arvind Neelakantan, Pranav Shyam, Girish Sastry, Amanda Askell, et al. Language models are few-shot learners. Advances in neural information processing systems, 33:1877--1901, 2020."},{"key":"e_1_3_2_2_11_1","volume-title":"Toolformer: Language models can teach themselves to use tools. arXiv preprint arXiv:2302.04761","author":"Schick Timo","year":"2023","unstructured":"Timo Schick, Jane Dwivedi-Yu, Roberto Dess\u00ec, Roberta Raileanu, Maria Lomeli, Luke Zettlemoyer, Nicola Cancedda, and Thomas Scialom. Toolformer: Language models can teach themselves to use tools. arXiv preprint arXiv:2302.04761, 2023."},{"key":"e_1_3_2_2_12_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572, 2014."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_13_1","DOI":"10.1109\/PerCom45495.2020.9127389"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_14_1","DOI":"10.1109\/CVPR.2019.00790"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_15_1","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"e_1_3_2_2_16_1","volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199, 2013."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_17_1","DOI":"10.1109\/CVPR.2016.282"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_18_1","DOI":"10.1109\/TEVC.2019.2890858"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_19_1","DOI":"10.1145\/3394171.3413976"},{"key":"e_1_3_2_2_20_1","volume-title":"Role of swarm and evolutionary algorithms for intrusion detection system: A survey. Swarm and evolutionary computation, 53:100631","author":"Thakkar Ankit","year":"2020","unstructured":"Ankit Thakkar and Ritika Lohiya. Role of swarm and evolutionary algorithms for intrusion detection system: A survey. Swarm and evolutionary computation, 53:100631, 2020."},{"key":"e_1_3_2_2_21_1","volume-title":"Differential evolution: A survey of the state-of-the-art","author":"Das Swagatam","year":"2010","unstructured":"Swagatam Das and Ponnuthurai Nagaratnam Suganthan. Differential evolution: A survey of the state-of-the-art. IEEE transactions on evolutionary computation, 15(1):4--31, 2010."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_22_1","DOI":"10.1201\/9781351251389-8"},{"key":"e_1_3_2_2_23_1","volume-title":"Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083","author":"Madry Aleksander","year":"2017","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083, 2017."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_24_1","DOI":"10.1109\/EuroSP.2016.36"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_25_1","DOI":"10.1145\/3128572.3140448"},{"key":"e_1_3_2_2_26_1","volume-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models. arXiv preprint arXiv:1712.04248","author":"Brendel Wieland","year":"2017","unstructured":"Wieland Brendel, Jonas Rauber, and Matthias Bethge. Decision-based adversarial attacks: Reliable attacks against black-box machine learning models. arXiv preprint arXiv:1712.04248, 2017."},{"key":"e_1_3_2_2_27_1","volume-title":"Query-efficient hard-label black-box attack: An optimization-based approach. arXiv preprint arXiv:1807.04457","author":"Cheng Minhao","year":"2018","unstructured":"Minhao Cheng, Thong Le, Pin-Yu Chen, Jinfeng Yi, Huan Zhang, and Cho-Jui Hsieh. Query-efficient hard-label black-box attack: An optimization-based approach. arXiv preprint arXiv:1807.04457, 2018."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_28_1","DOI":"10.1007\/978-3-642-34062-8_69"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_29_1","DOI":"10.1016\/j.ins.2012.09.019"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_30_1","DOI":"10.1109\/CSE-EUC.2017.167"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_31_1","DOI":"10.1016\/j.cor.2015.09.006"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_32_1","DOI":"10.1109\/CIS.2016.0129"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_33_1","DOI":"10.1109\/CCAA.2016.7813736"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_34_1","DOI":"10.1109\/ICIP.1998.723653"},{"key":"e_1_3_2_2_35_1","volume-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky Alex","year":"2009","unstructured":"Alex Krizhevsky, Geoffrey Hinton, et al. Learning multiple layers of features from tiny images. 2009."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_36_1","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_2_37_1","volume-title":"Striving for simplicity: The all convolutional net. arXiv preprint arXiv:1412.6806","author":"Springenberg Jost Tobias","year":"2014","unstructured":"Jost Tobias Springenberg, Alexey Dosovitskiy, Thomas Brox, and Martin Riedmiller. Striving for simplicity: The all convolutional net. arXiv preprint arXiv:1412.6806, 2014."},{"key":"e_1_3_2_2_38_1","volume-title":"Network in network. arXiv preprint arXiv:1312.4400","author":"Lin Min","year":"2013","unstructured":"Min Lin, Qiang Chen, and Shuicheng Yan. Network in network. arXiv preprint arXiv:1312.4400, 2013."}],"event":{"sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"],"acronym":"GECCO '24","name":"GECCO '24: Genetic and Evolutionary Computation Conference","location":"Melbourne VIC Australia"},"container-title":["Proceedings of the Genetic and Evolutionary Computation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638529.3654231","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3638529.3654231","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:56:54Z","timestamp":1750291014000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638529.3654231"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,14]]},"references-count":38,"alternative-id":["10.1145\/3638529.3654231","10.1145\/3638529"],"URL":"https:\/\/doi.org\/10.1145\/3638529.3654231","relation":{},"subject":[],"published":{"date-parts":[[2024,7,14]]},"assertion":[{"value":"2024-07-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}