{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T21:01:34Z","timestamp":1720040494295},"reference-count":57,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["clinicalkey.fr","clinicalkey.jp","clinicalkey.com.au","clinicalkey.es","clinicalkey.com","elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers in Biology and Medicine"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1016\/j.compbiomed.2023.107248","type":"journal-article","created":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T16:53:25Z","timestamp":1690304005000},"page":"107248","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["Frequency constraint-based adversarial attack on deep neural networks for medical image classification"],"prefix":"10.1016","volume":"164","author":[{"given":"Fang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Jian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Han","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wentao","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Longfei","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Hongen","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Daoqiang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compbiomed.2023.107248_bib1","series-title":"Deep Residual Learning for Image recognition[C]\/\/Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"770","author":"He","year":"2016"},{"key":"10.1016\/j.compbiomed.2023.107248_bib2","first-page":"1","article-title":"Very deep convolutional networks for large-scale image recognition[C]\/\/3rd International Conference on Learning Representations (ICLR 2015)","author":"Simonyan","year":"2015","journal-title":"Computational and Biological Learning Society"},{"key":"10.1016\/j.compbiomed.2023.107248_bib3","series-title":"Rethinking the Inception Architecture for Computer vision[C]\/\/Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"2818","author":"Szegedy","year":"2016"},{"issue":"11","key":"10.1016\/j.compbiomed.2023.107248_bib4","doi-asserted-by":"crossref","first-page":"3212","DOI":"10.1109\/TNNLS.2018.2876865","article-title":"Object detection with deep learning: a review[J]","volume":"30","author":"Zhao","year":"2019","journal-title":"IEEE Transact. Neural Networks Learn. Syst."},{"key":"10.1016\/j.compbiomed.2023.107248_bib5","doi-asserted-by":"crossref","DOI":"10.1109\/JPROC.2023.3238524","article-title":"Object Detection in 20 Years: A survey[J]","author":"Zou","year":"2023","journal-title":"Proceed. IEEE"},{"key":"10.1016\/j.compbiomed.2023.107248_bib6","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/s13735-017-0141-z","article-title":"A review of semantic segmentation using deep neural networks[J]","volume":"7","author":"Guo","year":"2018","journal-title":"Int. J. Multi. Informat. Retrieval"},{"key":"10.1016\/j.compbiomed.2023.107248_bib7","doi-asserted-by":"crossref","first-page":"1795","DOI":"10.1007\/s00330-020-07147-3","article-title":"Fully automated body composition analysis in routine CT imaging using 3D semantic segmentation convolutional neural networks[J]","volume":"31","author":"Koitka","year":"2021","journal-title":"Eur. Radiol."},{"key":"10.1016\/j.compbiomed.2023.107248_bib8","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"1850","article-title":"View-gcn: view-based graph convolutional network for 3d shape analysis[C]","author":"Wei","year":"2020"},{"key":"10.1016\/j.compbiomed.2023.107248_bib9","series-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision","first-page":"574","article-title":"Unetr: transformers for 3d medical image segmentation[C]","author":"Hatamizadeh","year":"2022"},{"key":"10.1016\/j.compbiomed.2023.107248_bib10","doi-asserted-by":"crossref","first-page":"854","DOI":"10.1007\/s10489-020-01829-7","article-title":"Classification of COVID-19 in chest X-ray images using DeTraC deep convolutional neural network[J]","volume":"51","author":"Abbas","year":"2021","journal-title":"Appl. Intell."},{"key":"10.1016\/j.compbiomed.2023.107248_bib11","unstructured":"Goodfellow I J, Shlens J, Szegedy C. Explaining and Harnessing Adversarial examples[J]. arXiv preprint arXiv:1412.6572, 2014."},{"key":"10.1016\/j.compbiomed.2023.107248_bib12","doi-asserted-by":"crossref","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","article-title":"Threat of adversarial attacks on deep learning in computer vision: a survey[J]","volume":"6","author":"Akhtar","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.compbiomed.2023.107248_bib13","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2020.107332","article-title":"Understanding adversarial attacks on deep learning based medical image analysis systems[J]","volume":"110","author":"Ma","year":"2021","journal-title":"Pattern Recogn."},{"key":"10.1016\/j.compbiomed.2023.107248_bib14","series-title":"Medical Image Computing and Computer Assisted Intervention\u2013MICCAI 2018: 21st International Conference","first-page":"493","article-title":"Generalizability vs. robustness: investigating medical imaging networks using adversarial examples[C]","author":"Paschali","year":"2018"},{"key":"10.1016\/j.compbiomed.2023.107248_bib15","series-title":"Jekyll: Attacking Medical Image Diagnostics Using Deep Generative models[C]\/\/2020 IEEE European Symposium on Security and Privacy (EuroS&P)","first-page":"139","author":"Mangaokar","year":"2020"},{"issue":"17","key":"10.1016\/j.compbiomed.2023.107248_bib16","doi-asserted-by":"crossref","first-page":"2132","DOI":"10.3390\/electronics10172132","article-title":"A survey on adversarial deep learning robustness in medical image analysis[J]","volume":"10","author":"Apostolidis","year":"2021","journal-title":"Electronics"},{"key":"10.1016\/j.compbiomed.2023.107248_bib17","first-page":"9","article-title":"Towards deep learning models resistant to adversarial attacks","volume":"1050","author":"M\u0105dry","year":"2017","journal-title":"Stat"},{"key":"10.1016\/j.compbiomed.2023.107248_bib18","series-title":"Boosting Adversarial Attacks with momentum[C]\/\/Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"9185","author":"Dong","year":"2018"},{"key":"10.1016\/j.compbiomed.2023.107248_bib19","first-page":"39","article-title":"Towards evaluating the robustness of neural networks[C]\/\/2017 ieee symposium on security and privacy (sp)","author":"Carlini","year":"2017","journal-title":"IEEE"},{"key":"10.1016\/j.compbiomed.2023.107248_bib20","series-title":"Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security","first-page":"15","article-title":"Zoo: zeroth order optimization based black-box attacks to deep neural networks without training substitute models[C]","author":"Chen","year":"2017"},{"key":"10.1016\/j.compbiomed.2023.107248_bib21","unstructured":"Brendel W, Rauber J, Bethge M. Decision-based Adversarial Attacks: Reliable Attacks against Black-Box Machine Learning models[J]. arXiv preprint arXiv:1712.04248, 2017."},{"key":"10.1016\/j.compbiomed.2023.107248_bib22","doi-asserted-by":"crossref","first-page":"6487","DOI":"10.1109\/TIP.2022.3211736","article-title":"Toward understanding and boosting adversarial transferability from a distribution perspective[J]","volume":"31","author":"Zhu","year":"2022","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.compbiomed.2023.107248_bib23","series-title":"Practical Black-Box Attacks against Machine learning[C]\/\/Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","first-page":"506","author":"Papernot","year":"2017"},{"key":"10.1016\/j.compbiomed.2023.107248_bib24","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"14993","article-title":"Improving adversarial transferability via neuron attribution-based attacks[C]","author":"Zhang","year":"2022"},{"key":"10.1016\/j.compbiomed.2023.107248_bib25","unstructured":"Kurakin A, Goodfellow I, Bengio S. Adversarial Machine Learning at scale[J]. arXiv preprint arXiv:1611.01236, 2016."},{"issue":"4","key":"10.1016\/j.compbiomed.2023.107248_bib26","first-page":"6639","article-title":"Ml-loo: detecting adversarial examples with feature attribution[C]","volume":"34","author":"Yang","year":"2020","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"10.1016\/j.compbiomed.2023.107248_bib27","first-page":"31","article-title":"A simple unified framework for detecting out-of-distribution samples and adversarial attacks[J]","author":"Lee","year":"2018","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.compbiomed.2023.107248_bib28","unstructured":"Xie C, Wang J, Zhang Z, et al. Mitigating Adversarial Effects through randomization[J]. arXiv preprint arXiv:1711.01991, 2017."},{"key":"10.1016\/j.compbiomed.2023.107248_bib29","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"6084","article-title":"Comdefend: an efficient image compression model to defend adversarial examples[C]","author":"Jia","year":"2019"},{"key":"10.1016\/j.compbiomed.2023.107248_bib30","series-title":"High-frequency Component Helps Explain the Generalization of Convolutional Neural networks[C]\/\/Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"8684","author":"Wang","year":"2020"},{"key":"10.1016\/j.compbiomed.2023.107248_bib31","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.neucom.2021.06.078","article-title":"High frequency patterns play a key role in the generation of adversarial examples[J]","volume":"459","author":"Zhou","year":"2021","journal-title":"Neurocomputing"},{"key":"10.1016\/j.compbiomed.2023.107248_bib32","unstructured":"Guo C, Frank J S, Weinberger K Q. Low Frequency Adversarial perturbation[J]. arXiv preprint arXiv:1809.08758, 2018."},{"key":"10.1016\/j.compbiomed.2023.107248_bib33","doi-asserted-by":"crossref","first-page":"5856","DOI":"10.1109\/TIP.2022.3202366","article-title":"Frequency-tuned universal adversarial attacks on texture recognition[J]","volume":"31","author":"Deng","year":"2022","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.compbiomed.2023.107248_bib34","unstructured":"Maiya S R, Ehrlich M, Agarwal V, et al. A Frequency Perspective of Adversarial robustness[J]. arXiv preprint arXiv:2111.00861, 2021."},{"key":"10.1016\/j.compbiomed.2023.107248_bib35","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"4103","article-title":"Exploring frequency adversarial attacks for face forgery detection[C]","author":"Jia","year":"2022"},{"key":"10.1016\/j.compbiomed.2023.107248_bib36","series-title":"Kaggle Diabetic Retinopathy Detection Challenge","author":"Kaggle","year":"2015"},{"issue":"2","key":"10.1016\/j.compbiomed.2023.107248_bib37","first-page":"1","article-title":"Hybridizing convolutional neural network for classification of lung diseases[J]","volume":"13","author":"Soni","year":"2022","journal-title":"Int. J. Swarm Intell. Res. (IJSIR)"},{"issue":"7639","key":"10.1016\/j.compbiomed.2023.107248_bib38","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1038\/nature21056","article-title":"Dermatologist-level classification of skin cancer with deep neural networks[J]","volume":"542","author":"Esteva","year":"2017","journal-title":"Nature"},{"issue":"17","key":"10.1016\/j.compbiomed.2023.107248_bib39","doi-asserted-by":"crossref","first-page":"2132","DOI":"10.3390\/electronics10172132","article-title":"A survey on adversarial deep learning robustness in medical image analysis[J]","volume":"10","author":"Apostolidis","year":"2021","journal-title":"Electronics"},{"key":"10.1016\/j.compbiomed.2023.107248_bib40","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"7066","article-title":"Feature space perturbations yield more transferable adversarial examples[C]","author":"Inkawhich","year":"2019"},{"key":"10.1016\/j.compbiomed.2023.107248_bib41","first-page":"1","article-title":"Adversarial manipulation of deep representations","author":"Sabour","year":"2015","journal-title":"arXiv"},{"key":"10.1016\/j.compbiomed.2023.107248_bib42","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"15064","article-title":"Cross-modal transferable adversarial attacks from images to videos[C]","author":"Wei","year":"2022"},{"key":"10.1016\/j.compbiomed.2023.107248_bib43","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2022.109028","article-title":"Temporal sparse adversarial attack on sequence-based gait recognition[J]","volume":"133","author":"He","year":"2023","journal-title":"Pattern Recogn."},{"key":"10.1016\/j.compbiomed.2023.107248_bib44","series-title":"High-frequency Component Helps Explain the Generalization of Convolutional Neural networks[C]\/\/Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"8684","author":"Wang","year":"2020"},{"key":"10.1016\/j.compbiomed.2023.107248_bib45","article-title":"A fourier perspective on model robustness in computer vision[J]","volume":"32","author":"Yin","year":"2019","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.compbiomed.2023.107248_bib46","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"13919","article-title":"Focal frequency loss for image reconstruction and synthesis[C]","author":"Jiang","year":"2021"},{"key":"10.1016\/j.compbiomed.2023.107248_bib47","doi-asserted-by":"crossref","first-page":"132665","DOI":"10.1109\/ACCESS.2020.3010287","article-title":"Can AI help in screening viral and COVID-19 pneumonia?[J]","volume":"8","author":"Chowdhury","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.compbiomed.2023.107248_bib48","article-title":"Dataset of breast ultrasound images","volume":"28","author":"Al-Dhabyani","year":"2020","journal-title":"[J]. Data in brief"},{"issue":"5","key":"10.1016\/j.compbiomed.2023.107248_bib49","first-page":"2252","article-title":"Thyroid nodule segmentation and classification in ultrasound images[J]","volume":"3","author":"Gireesha","year":"2014","journal-title":"Int. J. Eng. Res. Technol."},{"key":"10.1016\/j.compbiomed.2023.107248_bib50","doi-asserted-by":"crossref","unstructured":"Morozov S P, Andreychenko A E, Pavlov N A, et al. Mosmeddata: Chest Ct Scans with Covid-19 Related Findings dataset[J]. arXiv preprint arXiv:2005.06465, 2020.","DOI":"10.1101\/2020.05.20.20100362"},{"key":"10.1016\/j.compbiomed.2023.107248_bib51","series-title":"Densely Connected Convolutional networks[C]\/\/Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"4700","author":"Huang","year":"2017"},{"key":"10.1016\/j.compbiomed.2023.107248_bib52","series-title":"Proceedings of the IEEE international conference on computer vision","first-page":"4489","article-title":"Learning spatiotemporal features with 3d convolutional networks[C]","author":"Tran","year":"2015"},{"key":"10.1016\/j.compbiomed.2023.107248_bib53","first-page":"30","article-title":"Gans trained by a two time-scale update rule converge to a local nash equilibrium[J]","author":"Heusel","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"10","key":"10.1016\/j.compbiomed.2023.107248_bib54","doi-asserted-by":"crossref","first-page":"2452","DOI":"10.1109\/TPAMI.2018.2861800","article-title":"Generalizable data-free objective for crafting universal adversarial perturbations[J]","volume":"41","author":"Mopuri","year":"2018","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.compbiomed.2023.107248_bib55","series-title":"Frequency Domain Model Augmentation for Adversarial attack[C]\/\/Computer Vision\u2013ECCV 2022: 17th European Conference, Tel Aviv, Israel, October 23\u201327, 2022, Proceedings, Part IV","first-page":"549","author":"Long","year":"2022"},{"key":"10.1016\/j.compbiomed.2023.107248_bib56","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"458","article-title":"Amplitude-phase recombination: rethinking robustness of convolutional neural networks in frequency domain[C]","author":"Chen","year":"2021"},{"key":"10.1016\/j.compbiomed.2023.107248_bib57","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"1924","article-title":"Enhancing the transferability of adversarial attacks through variance tuning[C]","author":"Wang","year":"2021"}],"container-title":["Computers in Biology and Medicine"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0010482523007138?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0010482523007138?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T03:28:35Z","timestamp":1693884515000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0010482523007138"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":57,"alternative-id":["S0010482523007138"],"URL":"https:\/\/doi.org\/10.1016\/j.compbiomed.2023.107248","relation":{},"ISSN":["0010-4825"],"issn-type":[{"value":"0010-4825","type":"print"}],"subject":[],"published":{"date-parts":[[2023,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Frequency constraint-based adversarial attack on deep neural networks for medical image classification","name":"articletitle","label":"Article Title"},{"value":"Computers in Biology and Medicine","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compbiomed.2023.107248","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"107248"}}