{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T16:04:34Z","timestamp":1726502674775},"reference-count":47,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/100007065","name":"Nvidia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007065","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Pattern Recognition"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1016\/j.patcog.2021.108279","type":"journal-article","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T11:11:00Z","timestamp":1629803460000},"page":"108279","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":30,"special_numbering":"C","title":["A black-box adversarial attack strategy with adjustable sparsity and generalizability for deep image classifiers"],"prefix":"10.1016","volume":"122","author":[{"given":"Arka","family":"Ghosh","sequence":"first","affiliation":[]},{"given":"Sankha Subhra","family":"Mullick","sequence":"additional","affiliation":[]},{"given":"Shounak","family":"Datta","sequence":"additional","affiliation":[]},{"given":"Swagatam","family":"Das","sequence":"additional","affiliation":[]},{"given":"Asit Kr.","family":"Das","sequence":"additional","affiliation":[]},{"given":"Rammohan","family":"Mallipeddi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.patcog.2021.108279_bib0001","unstructured":"C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, R. Fergus, Intriguing properties of neural networks, arXiv preprint arXiv:1312.6199(2013)."},{"key":"10.1016\/j.patcog.2021.108279_bib0002","doi-asserted-by":"crossref","first-page":"107689","DOI":"10.1016\/j.patcog.2020.107689","article-title":"Black-box attack against handwritten signature verification with region-restricted adversarial perturbations","volume":"111","author":"Li","year":"2021","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2021.108279_bib0003","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"2574","article-title":"DeepFool: a simple and accurate method to fool deep neural networks","author":"Moosavi-Dezfooli","year":"2016"},{"key":"10.1016\/j.patcog.2021.108279_bib0004","doi-asserted-by":"crossref","first-page":"107903","DOI":"10.1016\/j.patcog.2021.107903","article-title":"Fooling deep neural detection networks with adaptive object-oriented adversarial perturbation","volume":"115","author":"Xiao","year":"2021","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2021.108279_bib0005","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","article-title":"Wild patterns: ten years after the rise of adversarial machine learning","volume":"84","author":"Biggio","year":"2018","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2021.108279_bib0006","unstructured":"I.J. Goodfellow, J. Shlens, C. Szegedy, Explaining and harnessing adversarial examples, arXiv preprint arXiv:1412.6572(2014)."},{"key":"10.1016\/j.patcog.2021.108279_bib0007","series-title":"2017 IEEE Symposium on Security and Privacy (SP)","first-page":"39","article-title":"Towards evaluating the robustness of neural networks","author":"Carlini","year":"2017"},{"key":"10.1016\/j.patcog.2021.108279_bib0008","series-title":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","first-page":"506","article-title":"Practical black-box attacks against machine learning","author":"Papernot","year":"2017"},{"key":"10.1016\/j.patcog.2021.108279_bib0009","series-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","first-page":"119","article-title":"Evading classifiers by morphing in the dark","author":"Dang","year":"2017"},{"key":"10.1016\/j.patcog.2021.108279_bib0010","doi-asserted-by":"crossref","first-page":"107184","DOI":"10.1016\/j.patcog.2019.107184","article-title":"Ensemble adversarial black-box attacks against deep learning systems","volume":"101","author":"Hang","year":"2020","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2021.108279_bib0011","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"121","article-title":"On the design of black-box adversarial examples by leveraging gradient-free optimization and operator splitting method","author":"Zhao","year":"2019"},{"key":"10.1016\/j.patcog.2021.108279_bib0012","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"1765","article-title":"Universal adversarial perturbations","author":"Moosavi-Dezfooli","year":"2017"},{"key":"10.1016\/j.patcog.2021.108279_bib0013","doi-asserted-by":"crossref","first-page":"107584","DOI":"10.1016\/j.patcog.2020.107584","article-title":"Universal adversarial perturbations against object detection","volume":"110","author":"Li","year":"2021","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.patcog.2021.108279_bib0014","series-title":"2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","first-page":"1310","article-title":"Simple black-box adversarial attacks on deep neural networks","author":"Narodytska","year":"2017"},{"key":"10.1016\/j.patcog.2021.108279_bib0015","doi-asserted-by":"crossref","DOI":"10.1109\/TEVC.2019.2890858","article-title":"One pixel attack for fooling deep neural networks","author":"Su","year":"2019","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"4","key":"10.1016\/j.patcog.2021.108279_bib0016","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1023\/A:1008202821328","article-title":"Differential evolution\u2013a simple and efficient heuristic for global optimization over continuous spaces","volume":"11","author":"Storn","year":"1997","journal-title":"J. Global Optim."},{"key":"10.1016\/j.patcog.2021.108279_bib0017","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.swevo.2016.01.004","article-title":"Recent advances in differential evolution\u2013an updated survey","volume":"27","author":"Das","year":"2016","journal-title":"Swarm Evol. Comput."},{"key":"10.1016\/j.patcog.2021.108279_bib0018","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1016\/j.swevo.2018.06.010","article-title":"Differential evolution: a survey of theoretical analyses","volume":"44","author":"Opara","year":"2019","journal-title":"Swarm Evol. Comput."},{"key":"10.1016\/j.patcog.2021.108279_bib0019","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.asoc.2017.03.003","article-title":"A switched parameter differential evolution with optional blending crossover for scalable numerical optimization","volume":"57","author":"Ghosh","year":"2017","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.patcog.2021.108279_bib0020","series-title":"Proceedings of the Genetic and Evolutionary Computation Conference","first-page":"1111","article-title":"GenAttack: practical black-box attacks with gradient-free optimization","author":"Alzantot","year":"2019"},{"key":"10.1016\/j.patcog.2021.108279_bib0021","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"9087","article-title":"SparseFool: a few pixels make a big difference","author":"Modas","year":"2019"},{"key":"10.1016\/j.patcog.2021.108279_bib0022","series-title":"Proceedings of the IEEE International Conference on Computer Vision","first-page":"4724","article-title":"Sparse and imperceivable adversarial attacks","author":"Croce","year":"2019"},{"key":"10.1016\/j.patcog.2021.108279_bib0023","series-title":"Advances in Neural Information Processing Systems","first-page":"10749","article-title":"With friends like these, who needs adversaries?","author":"Jetley","year":"2018"},{"key":"10.1016\/j.patcog.2021.108279_bib0024","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.patrec.2017.11.003","article-title":"A parameter independent fuzzy weighted k-nearest neighbor classifier","volume":"101","author":"Biswas","year":"2018","journal-title":"Pattern Recognit. Lett."},{"issue":"3","key":"10.1016\/j.patcog.2021.108279_bib0025","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","article-title":"ImageNet large scale visual recognition challenge","volume":"115","author":"Russakovsky","year":"2015","journal-title":"Int. J. Comput. Vis."},{"key":"10.1016\/j.patcog.2021.108279_bib0026","unstructured":"K. Simonyan, A. Zisserman, Very deep convolutional networks for large-scale image recognition, arXiv preprint arXiv:1409.1556(2014)."},{"key":"10.1016\/j.patcog.2021.108279_bib0027","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"1","article-title":"Going deeper with convolutions","author":"Szegedy","year":"2015"},{"key":"10.1016\/j.patcog.2021.108279_bib0028","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"2818","article-title":"Rethinking the inception architecture for computer vision","author":"Szegedy","year":"2016"},{"key":"10.1016\/j.patcog.2021.108279_bib0029","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He","year":"2016"},{"key":"10.1016\/j.patcog.2021.108279_bib0030","series-title":"2010 20th International Conference on Pattern Recognition","first-page":"2366","article-title":"Image quality metrics: PSNR VS. SSIM","author":"Hore","year":"2010"},{"key":"10.1016\/j.patcog.2021.108279_bib0031","series-title":"Towards a New Evolutionary Computation","first-page":"75","article-title":"The CMA evolution strategy: a comparing review","author":"Hansen","year":"2006"},{"key":"10.1016\/j.patcog.2021.108279_bib0032","series-title":"British Machine Vision Conference BMVC","first-page":"1","article-title":"Fast feature fool: a data independent approach to universal adversarial perturbations","author":"Mopuri","year":"2017"},{"key":"10.1016\/j.patcog.2021.108279_bib0033","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"742","article-title":"NAG: network for adversary generation","author":"Mopuri","year":"2018"},{"key":"10.1016\/j.patcog.2021.108279_bib0034","series-title":"IEEE Conference on Computer Vision and Pattern Recognition","first-page":"4422","article-title":"Generative adversarial perturbations","author":"Poursaeed","year":"2018"},{"key":"10.1016\/j.patcog.2021.108279_bib0035","series-title":"Proceedings of the IEEE International Conference on Computer Vision","first-page":"618","article-title":"Grad-CAM: visual explanations from deep networks via gradient-based localization","author":"Selvaraju","year":"2017"},{"key":"10.1016\/j.patcog.2021.108279_bib0036","article-title":"Generalizable data-free objective for crafting universal adversarial perturbations","author":"Mopuri","year":"2018","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.patcog.2021.108279_bib0037","unstructured":"F. Tram\u00e8r, A. Kurakin, N. Papernot, I. Goodfellow, D. Boneh, P. McDaniel, Ensemble adversarial training: attacks and defenses, arXiv preprint arXiv:1705.07204(2017)."},{"key":"10.1016\/j.patcog.2021.108279_bib0038","unstructured":"J.H. Metzen, T. Genewein, V. Fischer, B. Bischoff, On detecting adversarial perturbations, arXiv preprint arXiv:1702.04267(2017)."},{"key":"10.1016\/j.patcog.2021.108279_bib0039","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"3389","article-title":"Defense against universal adversarial perturbations","author":"Akhtar","year":"2018"},{"issue":"9","key":"10.1016\/j.patcog.2021.108279_bib0040","doi-asserted-by":"crossref","first-page":"1532","DOI":"10.1109\/83.862633","article-title":"Adaptive wavelet thresholding for image denoising and compression","volume":"9","author":"Chang","year":"2000","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.patcog.2021.108279_bib0041","unstructured":"G.K. Dziugaite, Z. Ghahramani, D.M. Roy, A study of the effect of JPG compression on adversarial images, arXiv preprint arXiv:1608.00853(2016)."},{"issue":"1","key":"10.1016\/j.patcog.2021.108279_bib0042","first-page":"89","article-title":"An algorithm for total variation minimization and applications","volume":"20","author":"Chambolle","year":"2004","journal-title":"J. Math. Imaging Vis."},{"key":"10.1016\/j.patcog.2021.108279_bib0043","series-title":"2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR\u201905)","first-page":"60","article-title":"A non-local algorithm for image denoising","volume":"vol.\u00a02","author":"Buades","year":"2005"},{"key":"10.1016\/j.patcog.2021.108279_bib0044","series-title":"Sixth International Conference on Computer Vision","first-page":"839","article-title":"Bilateral filtering for gray and color images","author":"Tomasi","year":"1998"},{"key":"10.1016\/j.patcog.2021.108279_bib0045","series-title":"International Conference on Machine Learning","first-page":"4636","article-title":"Parsimonious black-box adversarial attacks via efficient combinatorial optimization","author":"Moon","year":"2019"},{"key":"10.1016\/j.patcog.2021.108279_bib0046","series-title":"Proceedings of the IEEE International Conference on Computer Vision","first-page":"4862","article-title":"The LogBarrier adversarial attack: making effective use of decision boundary information","author":"Finlay","year":"2019"},{"key":"10.1016\/j.patcog.2021.108279_bib0047","series-title":"International Conference on Machine Learning","first-page":"2484","article-title":"Simple black-box adversarial attacks","volume":"vol.\u00a097","author":"Guo","year":"2019"}],"container-title":["Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0031320321004593?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0031320321004593?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,12,30]],"date-time":"2022-12-30T05:42:08Z","timestamp":1672378928000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0031320321004593"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2]]},"references-count":47,"alternative-id":["S0031320321004593"],"URL":"https:\/\/doi.org\/10.1016\/j.patcog.2021.108279","relation":{},"ISSN":["0031-3203"],"issn-type":[{"type":"print","value":"0031-3203"}],"subject":[],"published":{"date-parts":[[2022,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A black-box adversarial attack strategy with adjustable sparsity and generalizability for deep image classifiers","name":"articletitle","label":"Article Title"},{"value":"Pattern Recognition","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.patcog.2021.108279","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"108279"}}