{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,13]],"date-time":"2025-04-13T01:41:56Z","timestamp":1744508516279,"version":"3.37.3"},"reference-count":45,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100005047","name":"Natural Science Foundation of Liaoning Province","doi-asserted-by":"publisher","award":["2020-MS-080"],"id":[{"id":"10.13039\/501100005047","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2017YFF0108800"],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1016\/j.ins.2023.119081","type":"journal-article","created":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T15:09:32Z","timestamp":1683558572000},"page":"119081","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":8,"special_numbering":"C","title":["Boosting the transferability of adversarial attacks with adaptive points selecting in temporal neighborhood"],"prefix":"10.1016","volume":"641","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6501-4097","authenticated-orcid":false,"given":"Hegui","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Haoran","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Zhu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4344-8545","authenticated-orcid":false,"given":"Xiaoyan","family":"Sui","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2023.119081_br0010","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.ins.2022.01.051","article-title":"Improving adversarial robustness of bayesian neural networks via multi-task adversarial training","volume":"592","author":"Chen","year":"2022","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2023.119081_br0020","series-title":"International Conference on Information Security Practice and Experience","first-page":"32","article-title":"Enhanced mixup training: a defense method against membership inference attack","author":"Chen","year":"2021"},{"key":"10.1016\/j.ins.2023.119081_br0030","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"9185","article-title":"Boosting adversarial attacks with momentum","author":"Dong","year":"2018"},{"key":"10.1016\/j.ins.2023.119081_br0040","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"4312","article-title":"Evading defenses to transferable adversarial examples by translation-invariant attacks","author":"Dong","year":"2019"},{"key":"10.1016\/j.ins.2023.119081_br0050","series-title":"International Conference on Learning Representations - Workshop Track","article-title":"Incorporating nesterov momentum into adam","author":"Dozat","year":"2016"},{"key":"10.1016\/j.ins.2023.119081_br0060","series-title":"2021 IEEE\/CVF International Conference on Computer Vision","first-page":"7486","article-title":"Advdrop: adversarial attack to dnns by dropping information","author":"Duan","year":"2021"},{"key":"10.1016\/j.ins.2023.119081_br0070","first-page":"2121","article-title":"Adaptive subgradient methods for online learning and stochastic optimization","volume":"12","author":"Duchi","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.ins.2023.119081_br0080","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"8069","article-title":"Fda: feature disruptive attack","author":"Ganeshan","year":"2019"},{"key":"10.1016\/j.ins.2023.119081_br0090","series-title":"European Conference on Computer Vision","first-page":"307","article-title":"Patch-wise attack for fooling deep neural network","author":"Gao","year":"2020"},{"key":"10.1016\/j.ins.2023.119081_br0100","series-title":"3rd International Conference on Learning Representations","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2015"},{"key":"10.1016\/j.ins.2023.119081_br0110","series-title":"Proceedings of the Thirty-Fifth Conference on Uncertainty in Artificial Intelligence, volume 115","first-page":"1127","article-title":"Low frequency adversarial perturbation","author":"Guo","year":"2019"},{"key":"10.1016\/j.ins.2023.119081_br0120","series-title":"6th International Conference on Learning Representations","article-title":"Countering adversarial images using input transformations","author":"Guo","year":"2018"},{"key":"10.1016\/j.ins.2023.119081_br0130","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2019.107184","article-title":"Ensemble adversarial black-box attacks against deep learning systems","volume":"101","author":"Hang","year":"2020","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.ins.2023.119081_br0140","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He","year":"2016"},{"key":"10.1016\/j.ins.2023.119081_br0150","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"6084","article-title":"Comdefend: an efficient image compression model to defend adversarial examples","author":"Jia","year":"2019"},{"key":"10.1016\/j.ins.2023.119081_br0160","series-title":"5th International Conference on Learning Representations","article-title":"Adversarial examples in the physical world","author":"Kurakin","year":"2017"},{"key":"10.1016\/j.ins.2023.119081_br0170","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1016\/j.neunet.2022.07.012","article-title":"Interpolated adversarial training: achieving robust neural networks without sacrificing too much accuracy","volume":"154","author":"Lamb","year":"2022","journal-title":"Neural Netw."},{"key":"10.1016\/j.ins.2023.119081_br0180","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"272","article-title":"Adversarial vertex mixup: toward better adversarially robust generalization","author":"Lee","year":"2020"},{"key":"10.1016\/j.ins.2023.119081_br0190","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"638","article-title":"Towards transferable targeted attack","author":"Li","year":"2020"},{"key":"10.1016\/j.ins.2023.119081_br0200","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"11458","article-title":"Learning transferable adversarial examples via ghost networks","author":"Li","year":"2020"},{"key":"10.1016\/j.ins.2023.119081_br0210","series-title":"8th International Conference on Learning Representations","article-title":"Nesterov accelerated gradient and scale invariance for adversarial attacks","author":"Lin","year":"2020"},{"key":"10.1016\/j.ins.2023.119081_br0220","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"860","article-title":"Feature distillation: Dnn-oriented JPEG compression against adversarial examples","author":"Liu","year":"2019"},{"key":"10.1016\/j.ins.2023.119081_br0230","series-title":"European Conference on Computer Vision","first-page":"549","article-title":"Frequency domain model augmentation for adversarial attack","author":"Long","year":"2022"},{"key":"10.1016\/j.ins.2023.119081_br0240","series-title":"6th International Conference on Learning Representations","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2018"},{"key":"10.1016\/j.ins.2023.119081_br0250","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1016\/j.ins.2022.11.051","article-title":"Integrating safety constraints into adversarial training for robust deep reinforcement learning","volume":"619","author":"Meng","year":"2023","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2023.119081_br0260","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"259","article-title":"A self-supervised approach for adversarial robustness","author":"Naseer","year":"2020"},{"key":"10.1016\/j.ins.2023.119081_br0270","first-page":"543","article-title":"A method for unconstrained convex minimization problem with the rate of convergence o(1\/k2)","volume":"269","author":"Nesterov","year":"1983","journal-title":"Dokl. Akad. Nauk USSR"},{"key":"10.1016\/j.ins.2023.119081_br0280","series-title":"8th International Conference on Learning Representations","article-title":"Mixup inference: better exploiting mixup to defend adversarial attacks","author":"Pang","year":"2020"},{"key":"10.1016\/j.ins.2023.119081_br0290","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0041-5553(64)90137-5","article-title":"Some methods of speeding up the convergence of iteration methods","volume":"4","author":"Polyak","year":"1964","journal-title":"USSR Comput. Math. Math. Phys."},{"key":"10.1016\/j.ins.2023.119081_br0300","series-title":"2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"8571","article-title":"Deflecting adversarial attacks with pixel deflection","author":"Prakash","year":"2018"},{"key":"10.1016\/j.ins.2023.119081_br0310","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","article-title":"Imagenet large scale visual recognition challenge","volume":"115","author":"Russakovsky","year":"2015","journal-title":"Int. J. Comput. Vis."},{"key":"10.1016\/j.ins.2023.119081_br0320","series-title":"Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence","first-page":"4278","article-title":"Inception-v4, inception-resnet and the impact of residual connections on learning","author":"Szegedy","year":"2017"},{"key":"10.1016\/j.ins.2023.119081_br0330","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"2818","article-title":"Rethinking the inception architecture for computer vision","author":"Szegedy","year":"2016"},{"key":"10.1016\/j.ins.2023.119081_br0340","series-title":"2nd International Conference on Learning Representations","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2014"},{"key":"10.1016\/j.ins.2023.119081_br0350","series-title":"6th International Conference on Learning Representations","article-title":"Ensemble adversarial training: attacks and defenses","author":"Tram\u00e8r","year":"2018"},{"key":"10.1016\/j.ins.2023.119081_br0360","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"1924","article-title":"Enhancing the transferability of adversarial attacks through variance tuning","author":"Wang","year":"2021"},{"key":"10.1016\/j.ins.2023.119081_br0370","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"16158","article-title":"Admix: enhancing the transferability of adversarial attacks","author":"Wang","year":"2021"},{"key":"10.1016\/j.ins.2023.119081_br0380","series-title":"2021 IEEE\/CVF International Conference on Computer Vision","first-page":"7619","article-title":"Feature importance-aware transferable adversarial attacks","author":"Wang","year":"2021"},{"key":"10.1016\/j.ins.2023.119081_br0390","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/j.ins.2020.10.028","article-title":"Black-box adversarial attacks by manipulating image attributes","volume":"550","author":"Wei","year":"2021","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2023.119081_br0400","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"2730","article-title":"Improving transferability of adversarial examples with input diversity","author":"Xie","year":"2019"},{"key":"10.1016\/j.ins.2023.119081_br0410","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1016\/j.ins.2020.05.099","article-title":"Generating universal adversarial perturbation with resnet","volume":"537","author":"Xu","year":"2020","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2023.119081_br0420","series-title":"25th Annual Network and Distributed System Security Symposium","article-title":"Feature squeezing: detecting adversarial examples in deep neural networks","author":"Xu","year":"2018"},{"key":"10.1016\/j.ins.2023.119081_br0430","series-title":"Advances in Neural Information Processing Systems","first-page":"6115","article-title":"On success and simplicity: a second look at transferable targeted attacks","author":"Zhao","year":"2021"},{"key":"10.1016\/j.ins.2023.119081_br0440","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.103057","article-title":"Ligaa: generative adversarial attack method based on low-frequency information","volume":"125","author":"Zhu","year":"2023","journal-title":"Comput. Secur."},{"key":"10.1016\/j.ins.2023.119081_br0450","series-title":"European Conference on Computer Vision","first-page":"563","article-title":"Improving the transferability of adversarial examples with resized-diverse-inputs, diversity-ensemble and region fitting","author":"Zou","year":"2020"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025523006667?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025523006667?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T08:41:48Z","timestamp":1705567308000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025523006667"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":45,"alternative-id":["S0020025523006667"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2023.119081","relation":{},"ISSN":["0020-0255"],"issn-type":[{"type":"print","value":"0020-0255"}],"subject":[],"published":{"date-parts":[[2023,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Boosting the transferability of adversarial attacks with adaptive points selecting in temporal neighborhood","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2023.119081","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"119081"}}