{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:38:50Z","timestamp":1776926330383,"version":"3.51.2"},"reference-count":50,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064896","type":"journal-article","created":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T03:54:21Z","timestamp":1749527661000},"page":"4469-4490","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["SAMI-FGSM: Towards Transferable Attacks with Stochastic Gradient Accumulation"],"prefix":"10.32604","volume":"84","author":[{"given":"Haolang","family":"Feng","sequence":"first","affiliation":[]},{"given":"Yuling","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xuewei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Haiwei","family":"Sang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","first-page":"84","article-title":"Imagenet classification with deep convolutional neural networks","volume":"25","author":"Krizhevsky","year":"2012","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref2","unstructured":"Simonyan K, Zisserman A. Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556. 2014."},{"key":"ref3","series-title":"2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2023 Jun 17\u201324; Vancouver, BC, Canada","first-page":"1482","article-title":"Micron-BERT: BERT-based facial micro-expression recognition","author":"Nguyen"},{"key":"ref4","series-title":"Proceedings of the 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition; 2023 Jun 17\u201324; Vancouver, BC, Canada","first-page":"24699","article-title":"Physical-world optical adversarial attacks on 3D face recognition","author":"Li"},{"key":"ref5","series-title":"Proceedings of the 2023 IEEE\/CVF International Conference on Computer Vision; 2023 Oct 1\u20136; Paris, France","first-page":"8340","article-title":"VAD: vectorized scene representation for efficient autonomous driving","author":"Jiang"},{"key":"ref6","series-title":"Proceedings of the 2023 IEEE\/CVF International Conference on Computer Vision; 2023 Oct 1\u20136; Paris, France","first-page":"7953","article-title":"DriveAdapter: breaking the coupling barrier of perception and planning in end-to-end autonomous driving","author":"Jia"},{"key":"ref7","series-title":"Proceedings of the 2023 IEEE\/CVF International Conference on Computer Vision; 2023 Oct 1\u20136; Paris, France","first-page":"17728","article-title":"Ada3D: exploiting the spatial redundancy with adaptive inference for efficient 3D object detection","author":"Zhao"},{"key":"ref8","series-title":"Proceedings of the 2021 AAAI Conference on Artificial Intelligence","first-page":"8884","article-title":"Composite adversarial attacks","author":"Mao","year":"2021 Feb 2\u20139"},{"key":"ref9","series-title":"Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition; 2020 Jun 13\u201319; Seattle, WA, USA","first-page":"1039","article-title":"Towards large yet imperceptible adversarial image perturbations with perceptual color distance","author":"Zhao"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"461","DOI":"10.3390\/e25030461","article-title":"GLH: from global to local gradient attacks with high-frequency momentum guidance for object detection","volume":"25","author":"Chen","year":"2023","journal-title":"Entropy"},{"key":"ref11","series-title":"Proceedings of the 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition; 2021 Jun 20\u201325; Nashville, TN, USA","first-page":"1924","article-title":"Enhancing the transferability of adversarial attacks through variance tuning","author":"Wang"},{"key":"ref12","unstructured":"Wang G, Wei X, Yan H. Improving adversarial transferability with spatial momentum. arXiv:2203.13479. 2022."},{"key":"ref13","unstructured":"Goodfellow IJ, Shlens J, Szegedy C. Explaining and harnessing adversarial examples. arXiv:1412.6572. 2014."},{"key":"ref14","series-title":"Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition; 2018 Jun 18\u201323; Salt Lake City, UT, USA","first-page":"9185","article-title":"Boosting adversarial attacks with momentum","author":"Dong"},{"key":"ref15","unstructured":"Lin J, Song C, He K, Wang L, Hopcroft JE. Nesterov accelerated gradient and scale invariance for adversarial attacks. arXiv:1908.06281. 2019."},{"key":"ref16","doi-asserted-by":"crossref","first-page":"124757","DOI":"10.1016\/j.eswa.2024.124757","article-title":"Boosting the transferability of adversarial attacks with global momentum initialization","volume":"255","author":"Wang","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref17","series-title":"Computer Vision\u2013ECCV 2020: 16th European Conference, 2020 Aug 23\u201328; Glasgow, UK","first-page":"241","article-title":"Yet another intermediate-level attack","author":"Li"},{"key":"ref18","series-title":"European Conference on Computer Vision","first-page":"549","article-title":"Frequency domain model augmentation for adversarial attack","author":"Long","year":"2022"},{"key":"ref19","doi-asserted-by":"crossref","unstructured":"Yang X, Lin J, Zhang H, Yang X, Zhao P. Improving the transferability of adversarial examples via direction tuning. arXiv:2303.15109. 2023.","DOI":"10.1016\/j.ins.2023.119491"},{"key":"ref20","series-title":"Proceedings of the 2021 IEEE\/CVF International Conference on Computer Vision; 2021 Oct 10\u201317; Montreal, QC, Canada","first-page":"7639","article-title":"Feature importance-aware transferable adversarial attacks","author":"Wang"},{"key":"ref21","series-title":"Proceedings of the 2019 IEEE\/CVF International Conference on Computer Vision; 2019 Oct 27\u2013Nov 2; Seoul, Republic of Korea","first-page":"4733","article-title":"Enhancing adversarial example transferability with an intermediate level attack","author":"Huang"},{"key":"ref22","series-title":"Proceedings of the 2023 IEEE\/CVF International Conference on Computer Vision; 2023 Oct 1\u20136; Paris, France","first-page":"4741","article-title":"Boosting adversarial transferability via gradient relevance attack","author":"Zhu"},{"key":"ref23","series-title":"Proceedings of the 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition; 2019 Jun 15\u201320; Long Beach, CA, USA","first-page":"4312","article-title":"Evading defenses to transferable adversarial examples by translation-invariant attacks","author":"Dong"},{"key":"ref24","series-title":"Proceedings of the 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition; 2019 Jun 15\u201320; Long Beach, CA, USA","first-page":"2730","article-title":"Improving transferability of adversarial examples with input diversity","author":"Xie"},{"key":"ref25","doi-asserted-by":"crossref","unstructured":"Zhang H, Yao Z, Sakurai K. Versatile defense against adversarial attacks on image recognition. arXiv:2403.08170. 2024.","DOI":"10.3390\/app14188119"},{"key":"ref26","unstructured":"Tram\u00e8r F, Kurakin A, Papernot N, Goodfellow I, Boneh D, McDaniel P. Ensemble adversarial training: attacks and defenses. arXiv:1705.07204. 2017."},{"key":"ref27","unstructured":"Shafahi A, Najibi M, Ghiasi MA, Xu Z, Dickerson J, Studer C, et al. Adversarial training for free! In:  Advances in neural information processing systems; 2019. doi:10.48550\/arXiv.1904.12843."},{"key":"ref28","series-title":"Proceedings of the 2021 AAAI Conference on Artificial Intelligence","first-page":"7574","article-title":"Attribute-guided adversarial training for robustness to natural perturbations","author":"Gokhale","year":"2021 Feb 2\u20139"},{"key":"ref29","series-title":"Proceedings of the 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition; 2020 Jun 13\u201319; Seattle, WA, USA","first-page":"262","article-title":"A self-supervised approach for adversarial robustness","author":"Naseer"},{"key":"ref30","doi-asserted-by":"crossref","unstructured":"Xu W. Feature squeezing: detecting adversarial examples in deep neural networks. arXiv:1704.01155. 2017.","DOI":"10.14722\/ndss.2018.23198"},{"key":"ref31","series-title":"2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"860","article-title":"Feature distillation: DNN-oriented JPEG compression against adversarial examples","author":"Liu","year":"2019 Jun 15\u201320"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1201\/9781351251389-8","author":"Kurakin","year":"2018","journal-title":"Artificial intelligence safety and security"},{"key":"ref33","series-title":"Proceedings of the 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition; 2023 Jun 17\u201324; Vancouver, BC, Canada","first-page":"12281","article-title":"Enhancing the self-universality for transferable targeted attacks","author":"Wei"},{"key":"ref34","series-title":"Proceedings of the 2017 IEEE International Conference on Computer Vision; 2017 Oct 22\u201329; Venice, Italy","first-page":"618","article-title":"Grad-cam: visual explanations from deep networks via gradient-based localization","author":"Selvaraju"},{"key":"ref35","series-title":"Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition; 2016 Jun 27\u201330; Las Vegas, NV, USA","first-page":"2818","article-title":"Rethinking the inception architecture for computer vision","author":"Szegedy"},{"key":"ref36","series-title":"AAAI\u201917: Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence; 2017 Feb 4\u20139; San Francisco, CA, USA","first-page":"4278","article-title":"Inception-V4, Inception-ResNet and the impact of residual connections on learning","author":"Szegedy"},{"key":"ref37","series-title":"Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition; 2016 Jun 27\u201330; Las Vegas, NV, USA","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He"},{"key":"ref38","unstructured":"Dosovitskiy A, Beyer L, Kolesnikov A, Weissenborn D, Zhai X, Unterthiner T, et al. An image is worth 16x16 words: transformers for image recognition at scale. arXiv: 2010.11929. 2020."},{"key":"ref39","series-title":"Proceedings of the 2021 IEEE\/CVF International Conference on Computer Vision; 2021 Oct 10\u201317; Montreal, QC, Canada","first-page":"11936","article-title":"Rethinking spatial dimensions of vision transformers","author":"Heo"},{"key":"ref40","series-title":"Proceedings of the 2021 IEEE\/CVF International Conference on Computer Vision; 2021 Oct 10\u201317; Montreal, QC, Canada","first-page":"589","article-title":"Visformer: the vision-friendly transformer","author":"Chen"},{"key":"ref41","series-title":"Proceedings of the 2021 IEEE\/CVF International Conference on Computer Vision; 2021 Oct 10\u201317; Montreal, QC, Canada","first-page":"10012","article-title":"Swin transformer: hierarchical vision transformer using shifted windows","author":"Liu"},{"key":"ref42","unstructured":"Xie C, Wang J, Zhang Z, Ren Z, Yuille A. Mitigating adversarial effects through randomization. arXiv:1711.01991. 2017."},{"key":"ref43","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition; 2018 Jun 18\u201323; Salt Lake City, UT, USA","article-title":"Defense against adversarial attacks using high-level representation guided denoiser","author":"Liao"},{"key":"ref44","series-title":"ICML 2019: 36th International Conference on Machine Learning; 2019 Jun 10\u201315; Long Beach, CA, USA","first-page":"1310","article-title":"Certified adversarial robustness via randomized smoothing","author":"Cohen"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"111909","DOI":"10.1016\/j.knosys.2024.111909","article-title":"Improving the transferability of adversarial examples through neighborhood attribution","volume":"296","author":"Ke","year":"2024","journal-title":"Knowl Based Syst"},{"key":"ref46","series-title":"Proceedings of the 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition; 2022 Jun 18\u201324; New Orleans, LA, USA","first-page":"14993","article-title":"Improving adversarial transferability via neuron attribution-based attacks","author":"Zhang"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"1462","DOI":"10.1109\/TIFS.2025.3526067","article-title":"Enhancing the transferability of adversarial attacks via multi-feature attention","volume":"20","author":"Zheng","year":"2025","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref48","unstructured":"Liu Y, Chen X, Liu C, Song D. Delving into transferable adversarial examples and black-box attacks. arXiv:1611.02770. 2016."},{"key":"ref49","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1145\/3702638","article-title":"Survey on adversarial attack and defense for medical image analysis: methods and challenges","volume":"57","author":"Dong","year":"2025","journal-title":"ACM Comput Surv"},{"key":"ref50","series-title":"Proceedings of the 2022 IEEE\/CVF Winter Conference on Applications of Computer Vision; 2022 Jan 3\u20138; Waikoloa, HI, USA","first-page":"1796","article-title":"Physical adversarial attacks on an aerial imagery object detector","author":"Du"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_64896\/TSP_CMC_64896.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:22Z","timestamp":1776923122000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":50,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064896","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-02-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-22","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}