{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T00:47:29Z","timestamp":1765500449502,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62176264"],"award-info":[{"award-number":["62176264"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,10]]},"DOI":"10.1145\/3746252.3760870","type":"proceedings-article","created":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T18:37:32Z","timestamp":1762799852000},"page":"4976-4980","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Sequential Difference Maximization: Generating Adversarial Examples via Multi-Stage Optimization"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6586-4457","authenticated-orcid":false,"given":"Xinlei","family":"Liu","sequence":"first","affiliation":[{"name":"Information Engineering University, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7641-5622","authenticated-orcid":false,"given":"Tao","family":"Hu","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, China and Key Laboratory of Cyberspace Security, Ministry of Education of China, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0094-5982","authenticated-orcid":false,"given":"Peng","family":"Yi","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, China and Key Laboratory of Cyberspace Security, Ministry of Education of China, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7316-4856","authenticated-orcid":false,"given":"Weitao","family":"Han","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3075-188X","authenticated-orcid":false,"given":"Jichao","family":"Xie","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6612-9040","authenticated-orcid":false,"given":"Baolin","family":"Li","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2025,11,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1609\/AAAI.V35I2.16191"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.IPM.2021.102680"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005152503060309"},{"key":"e_1_3_2_1_6_1","volume-title":"Explaining and Harnessing Adversarial Examples. In 2015 International Conference on Learning Representations (ICLR), Yoshua Bengio and Yann LeCun (Eds.).","author":"Goodfellow Ian J.","year":"2015","unstructured":"Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In 2015 International Conference on Learning Representations (ICLR), Yoshua Bengio and Yann LeCun (Eds.)."},{"key":"e_1_3_2_1_7_1","volume-title":"2020 International Conference on Machine Learning (ICML)","volume":"119","author":"Croce Francesco","year":"2020","unstructured":"Francesco Croce and Matthias Hein. 2020. Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In 2020 International Conference on Machine Learning (ICML), Vol. 119. PMLR, 2206--2216."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3627673.3679858"},{"key":"e_1_3_2_1_9_1","volume-title":"Threat of Adversarial Attacks on Deep Learning in Computer Vision: Survey II. CoRR abs\/2108.00401","author":"Akhtar Naveed","year":"2021","unstructured":"Naveed Akhtar, Ajmal Mian, Navid Kardan, and Mubarak Shah. 2021. Threat of Adversarial Attacks on Deep Learning in Computer Vision: Survey II. CoRR abs\/2108.00401 (2021). arXiv:2108.00401"},{"key":"e_1_3_2_1_10_1","volume-title":"2018 International Conference on Learning Representations (ICLR). OpenReview.net.","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In 2018 International Conference on Learning Representations (ICLR). OpenReview.net."},{"key":"e_1_3_2_1_11_1","volume-title":"2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, April 14--16, 2014, Conference Track Proceedings. http:\/\/arxiv.org\/abs\/1312","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy, Wojciech Zaremba,Ilya Sutskever, Joan Bruna, DumitruErhan, Ian J. Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In 2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, April 14--16, 2014, Conference Track Proceedings. http:\/\/arxiv.org\/abs\/1312.6199"},{"key":"e_1_3_2_1_12_1","volume-title":"2017 International Conference on Learning Representations (ICLR). OpenReview.net.","author":"Kurakin Alexey","year":"2017","unstructured":"Alexey Kurakin, Ian J. Goodfellow, and Samy Bengio. 2017. Adversarial examples in the physical world. In 2017 International Conference on Learning Representations (ICLR). OpenReview.net."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/9.119632"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning, ICML 2019, 9--15","volume":"7482","author":"Zhang Hongyang","year":"2019","unstructured":"Hongyang Zhang, Yaodong Yu, Jiantao Jiao, Eric P. Xing, Laurent El Ghaoui, and Michael I. Jordan. 2019. Theoretically Principled Trade-off between Robustness and Accuracy. In Proceedings of the 36th International Conference on Machine Learning, ICML 2019, 9--15 June 2019, Long Beach, California, USA (Proceedings of Machine Learning Research, Vol. 97), Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.). PMLR, 7472--7482. http:\/\/proceedings.mlr.press\/v97\/zhang19p.html"},{"key":"e_1_3_2_1_16_1","volume-title":"Improving Adversarial Robustness Requires Revisiting Misclassified Examples. In 8th International Conference on Learning Representations, ICLR 2020","author":"Wang Yisen","year":"2020","unstructured":"Yisen Wang, Difan Zou, Jinfeng Yi, James Bailey, Xingjun Ma, and Quanquan Gu. 2020. Improving Adversarial Robustness Requires Revisiting Misclassified Examples. In 8th International Conference on Learning Representations, ICLR 2020, Addis Ababa, April 26--30, 2020. OpenReview.net. https:\/\/openreview.net\/forum?id=rklOg6EFwS"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02317"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5244\/C.30.87"},{"key":"e_1_3_2_1_19_1","unstructured":"A.Krizhevsky and G. Hinton. 2009. Learning multiple layers of features from tiny images. Master's thesis Department of Computer Science University of Toronto (2009). https:\/\/www.cs.utoronto.ca\/~kriz\/cifar.html"}],"event":{"name":"CIKM '25: The 34th ACM International Conference on Information and Knowledge Management","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Seoul Republic of Korea","acronym":"CIKM '25"},"container-title":["Proceedings of the 34th ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3746252.3760870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T00:45:37Z","timestamp":1765500337000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3746252.3760870"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,10]]},"references-count":19,"alternative-id":["10.1145\/3746252.3760870","10.1145\/3746252"],"URL":"https:\/\/doi.org\/10.1145\/3746252.3760870","relation":{},"subject":[],"published":{"date-parts":[[2025,11,10]]},"assertion":[{"value":"2025-11-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}