{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T09:49:11Z","timestamp":1762163351818,"version":"build-2065373602"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T00:00:00Z","timestamp":1762128000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T00:00:00Z","timestamp":1762128000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62402521","62402521"],"award-info":[{"award-number":["62402521","62402521"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-025-01309-0","type":"journal-article","created":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T09:41:34Z","timestamp":1762162894000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Block-level masking and feature importance-based adversarial example generation"],"prefix":"10.1186","volume":"12","author":[{"given":"Wenbo","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Yafei","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,3]]},"reference":[{"key":"1309_CR1","unstructured":"Liu Y, Chen X, Liu C, et al. Delving into transferable adversarial examples and black-box attacks[EB\/OL].(2017-02-07) [2025-02-26]. arXiv:1611.02770."},{"key":"1309_CR2","unstructured":"Goodfellow IJ, Shlens J, Szegedy C. Explaining and harnessing adversarial examples[EB\/OL].(2015-03-20) [2025-02-26]. arXiv:1412.6572."},{"key":"1309_CR3","doi-asserted-by":"crossref","unstructured":"Chen S, He Z, Sun C, et al. Universal adversarial attack on attention and the resulting dataset damagenet[J]. IEEE Trans Pattern Anal Mach Intell. 2020;44(4):2188\u20132197.","DOI":"10.1109\/TPAMI.2020.3033291"},{"issue":"4","key":"1309_CR4","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12040816","volume":"12","author":"H Wang","year":"2023","unstructured":"Wang H, Zhu C, Cao Y, et al. ADSAttack: An Adversarial Attack Algorithm via Searching Adversarial Distribution in Latent Space[J]. Electronics. 2023;12(4):816.","journal-title":"Electronics"},{"key":"1309_CR5","doi-asserted-by":"crossref","unstructured":"Wang Z, Guo H, Zhang Z, et al. Feature importance-aware transferable adversarial attacks[C]\/\/Proceedings of the IEEE\/CVF international conference on computer vision. 2021:7639\u20137648.","DOI":"10.1109\/ICCV48922.2021.00754"},{"key":"1309_CR6","doi-asserted-by":"crossref","unstructured":"Wei X, Zhao S. Boosting adversarial transferability with learnable patch-wise masks[J]. IEEE Trans Multimedia 2023;26:3778\u20133787.","DOI":"10.1109\/TMM.2023.3315550"},{"key":"1309_CR7","doi-asserted-by":"crossref","unstructured":"Chen P Y, Zhang H, Sharma Y, et al. Zoo: Zeroth order optimization based black-box attacks to deep neural networks without training substitute models[C]\/\/Proceedings of the 10th ACM workshop on artificial intelligence and security. 2017:15\u201326.","DOI":"10.1145\/3128572.3140448"},{"issue":"5","key":"1309_CR8","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","volume":"23","author":"J Su","year":"2019","unstructured":"Su J, Vargas D V, Sakurai K. One pixel attack for fooling deep neural networks[J]. IEEE Trans Evol Comput. 2019;23(5):828\u2013841.","journal-title":"IEEE Trans Evol Comput"},{"key":"1309_CR9","unstructured":"Brendel W, Rauber J, Bethge M. Decision-based adversarial attacks: reliable attacks against black-box machine learning models[EB\/OL].(2018-02-16) [2025-02-26]. arXiv:1712.04248."},{"key":"1309_CR10","doi-asserted-by":"crossref","unstructured":"Dong Y, Liao F, Pang T, et al. Boosting adversarial attacks with momentum[C]\/\/Proceedings of the IEEE conference on computer vision and pattern recognition. 2018:9185\u20139193.","DOI":"10.1109\/CVPR.2018.00957"},{"key":"1309_CR11","doi-asserted-by":"crossref","unstructured":"Wang X, He K. Enhancing the transferability of adversarial attacks through variance tuning[C]\/\/Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 2021:1924\u20131933.","DOI":"10.1109\/CVPR46437.2021.00196"},{"issue":"S1","key":"1309_CR12","first-page":"938","volume":"51","author":"W Li","year":"2024","unstructured":"Li W, Xiao R, Yang X. Enhancing the transferability of adversarial examples through Laplace smoothing gradients[J]. Comput Sci. 2024;51(S01):926\u2013931.","journal-title":"Comput Sci"},{"key":"1309_CR13","doi-asserted-by":"crossref","unstructured":"Xie C, Zhang Z, Zhou Y, et al. Improving transferability of adversarial examples with input diversity[C]\/\/Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 2019:2730\u20132739.","DOI":"10.1109\/CVPR.2019.00284"},{"key":"1309_CR14","doi-asserted-by":"crossref","unstructured":"Wang X, He X, Wang J,et al. Admix: Enhancing the transferability of adversarial attacks[C]\/\/Proceedings of the IEEE\/CVF International Conference on Computer Vision. 2021:16158\u201316167.","DOI":"10.1109\/ICCV48922.2021.01585"},{"issue":"10","key":"1309_CR15","first-page":"2391","volume":"52","author":"Shuai-na","year":"2022","unstructured":"Huang S N, Li Y X, Mao Y H, et al. Black-box transferable adversarial attacks based on ensemble advGAN[J]. J Jilin University(Engineering Technol Edition). 2022;52(10):2391\u20132398.","journal-title":"J Jilin University(Engineering Technol Edition)"},{"key":"1309_CR16","doi-asserted-by":"crossref","unstructured":"Huang H, Chen Z, Chen H, et al. T-sea: Transfer-based self-ensemble attack on object detection[C]\/\/Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 2023: 20514\u201320523.","DOI":"10.1109\/CVPR52729.2023.01965"},{"key":"1309_CR17","unstructured":"Lin Z. Research on transferable adversarial example generation algorithms [D]. Mianyang:Southwest University of Science and Technology, 2024."},{"key":"1309_CR18","doi-asserted-by":"crossref","unstructured":"Huang Q, Katsman I, He H, et al. Enhancing adversarial example transferability with an intermediate level attack[C]\/\/Proceedings of the IEEE\/CVF international conference on computer vision. 2019:4733\u20134742.","DOI":"10.1109\/ICCV.2019.00483"},{"key":"1309_CR19","first-page":"1905","volume":"36","author":"W Xiaosen","year":"2023","unstructured":"Wang X S, Tong K H, He K. Rethinking the backward propagation for adversarial transferability[J]. Adv Neural Inf Process Syst. 2023;36:1905\u20131922.","journal-title":"Adv Neural Inf Process Syst"},{"key":"1309_CR20","unstructured":"Wang M Y. Research on high-transfer adversarial example generation algorithms [D]. Nanjing: Nanjing University of Information Science and Technology, 2024."},{"key":"1309_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.118937","volume":"637","author":"R Lin","year":"2023","unstructured":"Lin R, Lin Y, Lin Z, et al. CCR-Net: Consistent contrastive representation network for multi-view clustering[J]. Inf Sci. 2023;637:118937.","journal-title":"Inf Sci"},{"key":"1309_CR22","doi-asserted-by":"publisher","first-page":"4623","DOI":"10.1109\/TSP.2021.3101979","volume":"69","author":"S Du","year":"2021","unstructured":"Du S, Liu Z, Chen Z, et al. Differentiable bi-sparse multi-view co-clustering[J]. IEEE Trans Signal Process. 2021;69:4623\u20134636.","journal-title":"IEEE Trans Signal Process"},{"key":"1309_CR23","doi-asserted-by":"publisher","first-page":"3399","DOI":"10.1109\/TIP.2024.3403055","volume":"33","author":"S Du","year":"2024","unstructured":"Du S, Cai Z, Wu Z, et al. UMCGL: Universal multi-view consensus graph learning with consistency and diversity[J]. IEEE Trans Image Process. 2024;33:3399\u20133412.","journal-title":"IEEE Trans Image Process"},{"key":"1309_CR24","doi-asserted-by":"crossref","unstructured":"Gao L, Zhang Q, Song J, et al. Patch-wise attack for fooling deep neural network[C]\/\/European Conference on Computer Vision. Cham: Springer International Publishing. 2020:307\u2013322.","DOI":"10.1007\/978-3-030-58604-1_19"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01309-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01309-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01309-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T09:41:39Z","timestamp":1762162899000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-025-01309-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,3]]},"references-count":24,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1309"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01309-0","relation":{},"ISSN":["2196-1115"],"issn-type":[{"type":"electronic","value":"2196-1115"}],"subject":[],"published":{"date-parts":[[2025,11,3]]},"assertion":[{"value":"26 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"244"}}