{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:17:57Z","timestamp":1761664677089,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Science Foundation of China","award":["61976065, 6137016, 62376066"],"award-info":[{"award-number":["61976065, 6137016, 62376066"]}]},{"name":"Guizhou Science Support Project","award":["2022-259"],"award-info":[{"award-number":["2022-259"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,20]]},"DOI":"10.1145\/3644116.3644161","type":"proceedings-article","created":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T18:38:22Z","timestamp":1712342302000},"page":"248-257","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["On One-Pixel Attacking Medical Images against Deep Learning Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2126-7006","authenticated-orcid":false,"given":"Yisong","family":"Wang","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Guizhou University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8489-2962","authenticated-orcid":false,"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Guizhou University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3350-666X","authenticated-orcid":false,"given":"Xianglong","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Guizhou University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3260-8079","authenticated-orcid":false,"given":"Zhuo","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Guizhou University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,5]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"623","volume-title":"Detecting one-pixel attacks using variational autoencoders. Information Systems and Technologies","author":"Alatalo J.","unstructured":"Alatalo, J., Sipola, T., Kokkonen, T., 2022. Detecting one-pixel attacks using variational autoencoders. Information Systems and Technologies, Springer International Publishing, Cham. pp. 611\u2013623."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2017.117"},{"key":"e_1_3_2_1_3_1","unstructured":"Bakas S. 2018. Identifying the best machine learning algorithms for brain tumor segmentation progression assessment and overall survival prediction in the BRATS challenge. CoRR abs\/1811.02629."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.08.009"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2017.14585"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature21056"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaw4399"},{"key":"e_1_3_2_1_8_1","unstructured":"Gale W. 2017. Detecting hip fractures with radiologist-level performance using deep neural networks. CoRR abs\/1711.06504."},{"key":"e_1_3_2_1_9_1","first-page":"71","volume-title":"Utnet: A hybrid transformer architecture for medical image segmentation, in","author":"Gao Y.","year":"2021","unstructured":"Gao, Y., Zhou, M., Metaxas, D.N., 2021. Utnet: A hybrid transformer architecture for medical image segmentation, in , Springer. pp. 61\u201371."},{"key":"e_1_3_2_1_10_1","volume-title":"ICLR 2015","author":"Goodfellow I.J.","year":"2015","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C., 2015. Explaining and harnessing adversarial examples, in: ICLR 2015, San Diego, CA, USA, 2015."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2016.17216"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-021-03819-2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.23919\/FRUCT52173.2021.9435562"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3483207.3483224"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","unstructured":"Laleh N.G. 2022. Adversarial attacks and adversarial robustness in computational pathology. bioRxiv doi:10.1101\/2022.03.15.484515.","DOI":"10.1101\/2022.03.15.484515"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","unstructured":"Liu Z. 2022. Deep learning based brain tumor segmentation: a survey. Complex & Intelligent Systems. doi:10.1007\/s40747-022-00815-5.","DOI":"10.1007\/s40747-022-00815-5"},{"volume-title":"SCC, Association for Computing Machinery","author":"Liu Z.Y.","key":"e_1_3_2_1_18_1","unstructured":"Liu, Z.Y., Wang, P.S., Hsiao, S.C., Tso, R., 2020. Defense against n-pixel attacks based on image reconstruction, in: SCC, Association for Computing Machinery, New York, NY, USA. p. 3\u20137."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging7020019"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-019-1799-6"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2014.2377694"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Mohamed A.W. Hadi A.A. Jambi K.M. 2019. Novel mutation strategy for enhancing SHADE and LSHADE algorithms for global numerical optimization. Swarm Evol. Comput. 50.","DOI":"10.1016\/j.swevo.2018.10.006"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534332"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20103"},{"key":"e_1_3_2_1_28_1","unstructured":"Raghunathan A. 2021. Adversarially robust machine learning with guarantees. Ph.D. thesis. Stanford University."},{"key":"e_1_3_2_1_29_1","volume-title":"Chexnet: Radiologist-level pneumonia detection on chest x-rays with deep learning. CoRR abs\/1711.05225.","author":"Rajpurkar P.","year":"2017","unstructured":"Rajpurkar, P. 2017. Chexnet: Radiologist-level pneumonia detection on chest x-rays with deep learning. CoRR abs\/1711.05225."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2019.12.012"},{"key":"e_1_3_2_1_31_1","volume-title":"ICLR 2020","author":"Ru B.","year":"2020","unstructured":"Ru, B., Cobb, A.D., Blaas, A., Gal, Y., 2020. Bayesopt adversarial attack, in: ICLR 2020, Addis Ababa, Ethiopia, April 26-30, 2020."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482029"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP40778.2020.9191084"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008202821328"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"e_1_3_2_1_36_1","volume-title":"ICLR 2014","author":"Szegedy C.","year":"2014","unstructured":"Szegedy, C. , 2014. Intriguing properties of neural networks, in: ICLR 2014, Banff, AB, Canada, April 14-16, 2014."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2013.6557555"},{"volume-title":"Deep Neural Evolution","author":"Vargas D.V.","key":"e_1_3_2_1_38_1","unstructured":"Vargas, D.V., 2020. Deep Neural Evolution. Springer. chapter: One-Pixel Attack: Understanding and Improving Deep Neural Networks with Evolutionary Computation. Natural Computing Series, p. 401\u2013430."},{"key":"e_1_3_2_1_39_1","unstructured":"Vargas D.V. Su J. 2019. Understanding the one-pixel attack: Propagation maps and locality analysis. CoRR abs\/1902.02947."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CAC51589.2020.9327603"}],"event":{"name":"ISAIMS 2023: 2023 4th International Symposium on Artificial Intelligence for Medicine Science","acronym":"ISAIMS 2023","location":"Chengdu China"},"container-title":["Proceedings of the 2023 4th International Symposium on Artificial Intelligence for Medicine Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3644116.3644161","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3644116.3644161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T14:13:41Z","timestamp":1755872021000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3644116.3644161"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,20]]},"references-count":40,"alternative-id":["10.1145\/3644116.3644161","10.1145\/3644116"],"URL":"https:\/\/doi.org\/10.1145\/3644116.3644161","relation":{},"subject":[],"published":{"date-parts":[[2023,10,20]]},"assertion":[{"value":"2024-04-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}