{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:39:14Z","timestamp":1763102354381,"version":"3.45.0"},"reference-count":28,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":88,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.059863","type":"journal-article","created":{"date-parts":[[2025,1,26]],"date-time":"2025-01-26T02:58:18Z","timestamp":1737860298000},"page":"157-175","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Adversarial Example Transferability via Regularized Constrained Feature Layer"],"prefix":"10.32604","volume":"83","author":[{"given":"Xiaoyin","family":"Yi","sequence":"first","affiliation":[]},{"given":"Long","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jiacheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Huang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","first-page":"175","article-title":"A comprehensive survey of robust deep learning in computer vision","volume":"2","author":"Liu","year":"2023","journal-title":"J Autom Intell"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"462","DOI":"10.3390\/info14080462","article-title":"A comprehensive study of ChatGPT: advancements, limitations, and ethical considerations in natural language processing and cybersecurity","volume":"14","author":"Alawida","year":"2023","journal-title":"Information"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"4613","DOI":"10.1080\/10494820.2023.2204343","article-title":"A systematic review of research on speech-recognition chatbots for language learning: implications for future directions in the era of large language models","volume":"32","author":"Jeon","year":"2024","journal-title":"Interact Learn Environ"},{"key":"ref4","series-title":"Proceedings of the 41st Meeting of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition; 2024 Jun 17\u201321","first-page":"16965","article-title":"DETRs beat YOLOs on real-time object detection","author":"Zhao","year":"2024"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1049\/cit2.12028","article-title":"A survey on adversarial attacks and defences","volume":"6","author":"Chakraborty","year":"2021","journal-title":"CAAI Trans Intell Technol"},{"key":"ref6","series-title":"Proceedings of the 18th Meeting of the IEEE\/CVF International Conference on Computer Vision; 2021 Oct 11\u201317","first-page":"16158","article-title":"Admix: enhancing the transferability of adversarial attacks","author":"Wang","year":"2021"},{"key":"ref7","series-title":"Proceedings of the 19th Meeting of the IEEE\/CVF International Conference on Computer Vision; 2023 Oct 2\u20136","first-page":"4630","article-title":"Transferable adversarial attack for both vision transformers and convolutional networks via momentum integrated gradients","author":"Ma","year":"2023"},{"key":"ref8","series-title":"Proceedings of the 8th Meeting of the IEEE International Conference on Image Processing; 2023 Jul 8\u201310","first-page":"3110","article-title":"GNP attack: transferable adversarial examples via gradient norm penalty","author":"Wu","year":"2023"},{"key":"ref9","series-title":"Proceedings of the 19th Meeting of the IEEE\/CVF International Conference on Computer Vision; 2023 Oct 2\u20136","first-page":"4607","article-title":"Structure invariant transformation for better adversarial transferability","author":"Wang","year":"2023"},{"key":"ref10","series-title":"Proceedings of the 38th Meeting of the AAAI Conference on Artificial Intelligence; 2024 Feb 20\u201327","first-page":"6109","article-title":"Towards transferable adversarial attacks with centralized perturbation","author":"Wu","year":"2024"},{"key":"ref11","series-title":"Proceedings of the 19th Meeting of the IEEE\/CVF International Conference on Computer Vision; 2023 Oct 2\u20136","first-page":"4489","article-title":"An adaptive model ensemble adversarial attack for boosting adversarial transferability","author":"Chen","year":"2023"},{"key":"ref12","series-title":"Proceedings of the 17th Meeting of the European Conference on Computer Vision; 2022 Oct 23\u201327","first-page":"603","article-title":"Lgv: boosting adversarial example transferability from large geometric vicinity","author":"Gubri","year":"2022"},{"key":"ref13","series-title":"Proceedings of the 37th Conference on Neural Information Processing Systems; 2023 Dec 10\u201316","first-page":"1","article-title":"Improving adversarial transferability via intermediate-level perturbation decay. Advances in neural information processing systems","author":"Li","year":"2023"},{"key":"ref14","series-title":"Proceedings of the 37th Meeting of the AAAI Conference on Artificial Intelligence; 2023 Feb 7\u201314","first-page":"9516","article-title":"Training meta-surrogate model for transferable adversarial attack","author":"Qin","year":"2023"},{"key":"ref15","series-title":"Proceedings of the 40th Meeting of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition; 2023 Jun 18\u201322","first-page":"16415","article-title":"Transferable adversarial attacks on vision transformers with token gradient regularization","author":"Zhang","year":"2023"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"6487","DOI":"10.1109\/TIP.2022.3211736","article-title":"Toward understanding and boosting adversarial transferability from a distribution perspective","volume":"31","author":"Zhu","year":"2022","journal-title":"IEEE Trans Image Process"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"2390","DOI":"10.3390\/en14092390","article-title":"Review on deep neural networks applied to low-frequency nilm","volume":"14","author":"Huber","year":"2021","journal-title":"Energies"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"112152","DOI":"10.1016\/j.knosys.2024.112152","article-title":"Boosting transferability of adversarial samples via saliency distribution and frequency domain enhancement","volume":"300","author":"Wang","year":"2024","journal-title":"Knowl Based Syst"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1201\/9781351251389-8","author":"Kurakin","year":"2018","journal-title":"Artificial intelligence safety and security"},{"key":"ref20","series-title":"Proceedings of the 35th Meeting of the IEEE Conference on Computer Vision and Pattern Recognition; 2018 Jun 18\u201322","first-page":"9185","article-title":"Boosting adversarial attacks with momentum","author":"Dong","year":"2018"},{"key":"ref21","series-title":"Proceedings of the 36th Meeting of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition; 2019 Jun 15\u201320","first-page":"2730","article-title":"Improving transferability of adversarial examples with input diversity","author":"Xie","year":"2019"},{"key":"ref22","series-title":"Proceedings of the 37th Conference on Neural Information Processing Systems; 2023 Dec 10\u201316","first-page":"70141","article-title":"Boosting adversarial transferability by achieving flat local maxima. Advances in neural information processing systems","author":"Ge","year":"2023"},{"key":"ref23","series-title":"Proceedings of the 33rd Meeting of the IEEE Conference on Computer Vision and Pattern Recognition; 2016 Jun 27\u201330","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He","year":"2016"},{"key":"ref24","series-title":"Proceedings of the 34th Meeting of the IEEE Conference on Computer Vision and Pattern Recognition; 2017 Jul 21\u201326","first-page":"4700","article-title":"Densely connected convolutional networks","author":"Huang","year":"2017"},{"key":"ref25","series-title":"Proceedings of the 32nd Meeting of the IEEE Conference on Computer Vision and Pattern Recognition; 2015 Jun 7\u201312","first-page":"1","article-title":"Going deeper with convolutions","author":"Szegedy","year":"2015"},{"key":"ref26","series-title":"Proceedings of the 33rd Meeting of the IEEE Conference on Computer Vision and Pattern Recognition; 2016 Jun 27\u201330","first-page":"2818","article-title":"Rethinking the inception architecture for computer vision","author":"Szegedy","year":"2016"},{"unstructured":"Iandola FN. SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and <0.5 MB model size. arXiv:1602.07360. 2016.","key":"ref27"},{"unstructured":"Tram\u00e8r F, Kurakin A, Papernot N, Goodfellow I, Boneh D, McDaniel P. Ensemble adversarial training: attacks and defenses. arXiv:1705.07204. 2017.","key":"ref28"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-1\/TSP_CMC_59863\/TSP_CMC_59863.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:35:16Z","timestamp":1763102116000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n1\/60082"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":28,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.059863","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-10-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-06","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-26","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}