{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T05:57:57Z","timestamp":1770271077371,"version":"3.49.0"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,10,22]],"date-time":"2022-10-22T00:00:00Z","timestamp":1666396800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,22]],"date-time":"2022-10-22T00:00:00Z","timestamp":1666396800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Process Lett"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s11063-022-11056-5","type":"journal-article","created":{"date-parts":[[2022,10,22]],"date-time":"2022-10-22T20:02:47Z","timestamp":1666468967000},"page":"4623-4639","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Interpretive Adversarial Attack Method: Attacking Softmax Gradient Layer-Wise Relevance Propagation Based on Cosine Similarity Constraint and TS-Invariant"],"prefix":"10.1007","volume":"55","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-4754-7049","authenticated-orcid":false,"given":"Zigang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Renjie","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Zhenghao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Long","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yuhong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Sheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,22]]},"reference":[{"issue":"7553","key":"11056_CR1","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y, Bengio Y, Hinton G (2015) Deep learning. nature 521(7553):436\u2013444","journal-title":"nature"},{"key":"11056_CR2","doi-asserted-by":"crossref","unstructured":"Deng L, Li J, Huang J-T, Yao K, Yu D, Seide F, Seltzer M, Zweig G, He X, Williams J et\u00a0al (2013) Recent advances in deep learning for speech research at microsoft. In: 2013 IEEE international conference on acoustics, speech and signal processing, p. 8604\u20138608 . IEEE","DOI":"10.1109\/ICASSP.2013.6639345"},{"key":"11056_CR3","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2012","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. Commun ACM 60:84\u201390","journal-title":"Commun ACM"},{"key":"11056_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cmpb.2018.04.005","volume":"161","author":"O Faust","year":"2018","unstructured":"Faust O, Hagiwara Y, Hong TJ, Lih OS, Acharya UR (2018) Deep learning for healthcare applications based on physiological signals: A review. Comput methods programs biomed 161:1\u201313","journal-title":"Comput methods programs biomed"},{"key":"11056_CR5","doi-asserted-by":"crossref","unstructured":"Fire M, Schler J (2017) Exploring online ad images using a deep convolutional neural network approach. In: 2017 IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), p. 1053\u20131060 . IEEE","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.160"},{"key":"11056_CR6","doi-asserted-by":"crossref","unstructured":"Memon Q, Ahmed M, Ali S, Memon AR, Shah W (2016) Self-driving and driver relaxing vehicle. In: 2016 2nd international conference on robotics and artificial intelligence (ICRAI), p. 170\u2013174 . IEEE","DOI":"10.1109\/ICRAI.2016.7791248"},{"key":"11056_CR7","doi-asserted-by":"crossref","unstructured":"Chen C, Seff A, Kornhauser A, Xiao J (2015) Deepdriving: Learning affordance for direct perception in autonomous driving. In: Proceedings of the IEEE international conference on computer vision, p. 2722\u20132730","DOI":"10.1109\/ICCV.2015.312"},{"issue":"8","key":"11056_CR8","doi-asserted-by":"publisher","first-page":"1836","DOI":"10.1093\/annonc\/mdy166","volume":"29","author":"HA Haenssle","year":"2018","unstructured":"Haenssle HA, Fink C, Schneiderbauer R, Toberer F, Buhl T, Blum A, Kalloo A, Hassen ABH, Thomas L, Enk A et al (2018) Man against machine: diagnostic performance of a deep learning convolutional neural network for dermoscopic melanoma recognition in comparison to 58 dermatologists. Annal oncol 29(8):1836\u20131842","journal-title":"Annal oncol"},{"issue":"6","key":"11056_CR9","doi-asserted-by":"publisher","first-page":"1695","DOI":"10.1109\/JBHI.2019.2959843","volume":"24","author":"S Ayd\u0131n","year":"2019","unstructured":"Ayd\u0131n S (2019) Deep learning classification of neuro-emotional phase domain complexity levels induced by affective video film clips. IEEE J Biomed Health Inform 24(6):1695\u20131702","journal-title":"IEEE J Biomed Health Inform"},{"key":"11056_CR10","doi-asserted-by":"crossref","unstructured":"Covington P, Adams J, Sargin E (2016) Deep neural networks for youtube recommendations. In: Proceedings of the 10th ACM conference on recommender systems, p. 191\u2013198","DOI":"10.1145\/2959100.2959190"},{"issue":"3","key":"11056_CR11","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky O, Deng J, Su H, Krause J, Satheesh S, Ma S, Huang Z, Karpathy A, Khosla A, Bernstein M, Berg AC, Fei-Fei L (2015) Imagenet large scale visual recognition challenge. Inter J Comput Vision 115(3):211\u2013252. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s11263-015-0816-y","journal-title":"Inter J Comput Vision"},{"key":"11056_CR12","unstructured":"Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. CoRR arXiv:1409.1556"},{"key":"11056_CR13","doi-asserted-by":"publisher","unstructured":"Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D, Erhan D, Vanhoucke V, Rabinovich A (2015) Going deeper with convolutions. In: 2015 IEEE conference on computer vision and pattern recognition (CVPR), p. 1\u20139 . https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/CVPR.2015.7298594","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"11056_CR14","doi-asserted-by":"publisher","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: 2016 IEEE conference on computer vision and pattern recognition (CVPR), p. 770\u2013778 . https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"11056_CR15","doi-asserted-by":"crossref","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2015) Rethinking the inception architecture for computer vision. CoRR arXiv:1512.00567","DOI":"10.1109\/CVPR.2016.308"},{"key":"11056_CR16","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Identity mappings in deep residual networks. In: European conference on computer vision, pp. 630\u2013645","DOI":"10.1007\/978-3-319-46493-0_38"},{"issue":"6","key":"11056_CR17","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TPAMI.2016.2577031","volume":"39","author":"S Ren","year":"2017","unstructured":"Ren S, He K, Girshick R, Sun J (2017) Faster r-cnn: Towards real-time object detection with region proposal networks. IEEE Transact Pattern Anal Mach Intell 39(6):1137\u20131149. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/TPAMI.2016.2577031","journal-title":"IEEE Transact Pattern Anal Mach Intell"},{"issue":"4","key":"11056_CR18","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1109\/TPAMI.2017.2699184","volume":"40","author":"L-C Chen","year":"2018","unstructured":"Chen L-C, Papandreou G, Kokkinos I, Murphy K, Yuille AL (2018) Deeplab: Semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected crfs. IEEE Transact Pattern Anal Mach Intell 40(4):834\u2013848. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/TPAMI.2017.2699184","journal-title":"IEEE Transact Pattern Anal Mach Intell"},{"issue":"4","key":"11056_CR19","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1109\/TPAMI.2016.2572683","volume":"39","author":"E Shelhamer","year":"2017","unstructured":"Shelhamer E, Long J, Darrell T (2017) Fully convolutional networks for semantic segmentation. IEEE Transact Pattern Anal Mach Intell 39(4):640\u2013651. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/TPAMI.2016.2572683","journal-title":"IEEE Transact Pattern Anal Mach Intell"},{"issue":"2","key":"11056_CR20","doi-asserted-by":"publisher","first-page":"342","DOI":"10.3390\/s20020342","volume":"20","author":"Y Kortli","year":"2020","unstructured":"Kortli Y, Jridi M, Al Falou A, Atri M (2020) Face recognit syst: A surv. Sensors 20(2):342","journal-title":"Sensors"},{"key":"11056_CR21","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar N, Mian A (2018) Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 6:14410\u201314430. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/ACCESS.2018.2807385","journal-title":"IEEE Access"},{"key":"11056_CR22","unstructured":"Goodfellow I, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. CoRR arXiv:1412.6572"},{"key":"11056_CR23","doi-asserted-by":"publisher","unstructured":"Papernot N, McDaniel P, Jha S, Fredrikson M, Celik ZB, Swami A (2016) The limitations of deep learning in adversarial settings. In: 2016 IEEE european symposium on security and privacy (EuroS P), p. 372\u2013387 . https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/EuroSP.2016.36","DOI":"10.1109\/EuroSP.2016.36"},{"key":"11056_CR24","doi-asserted-by":"publisher","unstructured":"Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 IEEE symposium on security and privacy (SP), p. 39\u201357 . https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/SP.2017.49","DOI":"10.1109\/SP.2017.49"},{"key":"11056_CR25","doi-asserted-by":"publisher","unstructured":"Dong Y, Liao F, Pang T, Su H, Zhu J, Hu X, Li J (2018) Boosting adversarial attacks with momentum. In: 2018 IEEE\/CVF conference on computer vision and pattern recognition, p. 9185\u20139193 . https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/CVPR.2018.00957","DOI":"10.1109\/CVPR.2018.00957"},{"key":"11056_CR26","doi-asserted-by":"crossref","unstructured":"Wei X, Liang S, Chen N, Cao X (2018) Transferable adversarial attacks for image and video object detection. arXiv preprint arXiv:1811.12641","DOI":"10.24963\/ijcai.2019\/134"},{"key":"11056_CR27","unstructured":"Belinkov Y, Bisk Y (2017) Synthetic and natural noise both break neural machine translation. arXiv preprint arXiv:1711.02173"},{"key":"11056_CR28","doi-asserted-by":"crossref","unstructured":"Eykholt K, Evtimov I, Fernandes E, Li B, Rahmati A, Xiao C, Prakash A, Kohno T, Song D (2018) Robust physical-world attacks on deep learning visual classification. In: Proceedings of the IEEE conference on computer vision and pattern recognition, p. 1625\u20131634","DOI":"10.1109\/CVPR.2018.00175"},{"key":"11056_CR29","unstructured":"Quiring E, Klein D, Arp D, Johns M, Rieck K (2020) Adversarial preprocessing: Understanding and preventing $$\\{$$Image-Scaling$$\\}$$ attacks in machine learning. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 1363\u20131380"},{"key":"11056_CR30","doi-asserted-by":"crossref","unstructured":"Sharif M, Bhagavatula S, Bauer L, Reiter MK (2016) Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In: Proceedings of the 2016 Acm Sigsac conference on computer and communications security, pp. 1528\u20131540","DOI":"10.1145\/2976749.2978392"},{"key":"11056_CR31","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199"},{"issue":"12","key":"11056_CR32","doi-asserted-by":"publisher","first-page":"3040","DOI":"10.1109\/TPAMI.2019.2919707","volume":"42","author":"A Arnab","year":"2020","unstructured":"Arnab A, Miksik O, Torr PHS (2020) On the robustness of semantic segmentation models to adversarial attacks. IEEE Transact Pattern Anal and Mach Intell 42(12):3040\u20133053. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/TPAMI.2019.2919707","journal-title":"IEEE Transact Pattern Anal and Mach Intell"},{"key":"11056_CR33","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","volume":"84","author":"B Biggio","year":"2018","unstructured":"Biggio B, Roli F (2018) Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recognit 84:317\u2013331. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.patcog.2018.07.023","journal-title":"Pattern Recognit"},{"key":"11056_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100199","volume":"34","author":"N Pitropakis","year":"2019","unstructured":"Pitropakis N, Panaousis E, Giannetsos T, Anastasiadis E, Loukas G (2019) A taxonomy and survey of attacks against machine learning. Comput Sci Rev 34:100199. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.cosrev.2019.100199","journal-title":"Comput Sci Rev"},{"key":"11056_CR35","doi-asserted-by":"publisher","unstructured":"Huang L, Joseph AD, Nelson B, Rubinstein BIP, Tygar JD (2011) Adversarial machine learning. In: Proceedings of the 4th ACM workshop on security and artificial intelligence. AISec \u201911, pp. 43\u201358. Association for computing machinery, New York, NY, USA . https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/2046684.2046692","DOI":"10.1145\/2046684.2046692"},{"key":"11056_CR36","doi-asserted-by":"crossref","unstructured":"Xie C, Zhang Z, Wang J, Zhou Y, Ren Z, Yuille AL (2018) Improving transferability of adversarial examples with input diversity. CoRR arXiv:1803.06978","DOI":"10.1109\/CVPR.2019.00284"},{"key":"11056_CR37","unstructured":"Ilyas A, Engstrom L, Madry A (2019) Prior convictions: Black-box adversarial attacks with bandits and priors. arXiv:1807.07978"},{"key":"11056_CR38","unstructured":"Yan Z, Guo Y, Zhang C (2019) Subspace attack: Exploiting promising subspaces for query-efficient black-box attacks. CoRR arXiv:1906.04392"},{"key":"11056_CR39","doi-asserted-by":"publisher","unstructured":"Moosavi-Dezfooli S-M, Fawzi A, Fawzi O, Frossard P (2017) Universal adversarial perturbations. In: 2017 IEEE conference on computer vision and pattern recognition (CVPR), pp. 86\u201394 https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/CVPR.2017.17","DOI":"10.1109\/CVPR.2017.17"},{"key":"11056_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107903","volume":"115","author":"Y Xiao","year":"2021","unstructured":"Xiao Y, Pun C-M, Liu B (2021) Fooling deep neural detection networks with adaptive object-oriented adversarial perturbation. Pattern Recogn 115:107903. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.patcog.2021.107903","journal-title":"Pattern Recogn"},{"key":"11056_CR41","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-02759-8","author":"S Wang","year":"2021","unstructured":"Wang S, Gong Y (2021) Adversarial example detection based on saliency map features. Appl Intell. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s10489-021-02759-8","journal-title":"Appl Intell"},{"key":"11056_CR42","doi-asserted-by":"publisher","unstructured":"Fang X, Li Z, Yang G (2021) A novel approach to generating high-resolution adversarial examples. Appl Intell 1\u201317. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s10489-021-02371-w","DOI":"10.1007\/s10489-021-02371-w"},{"issue":"7","key":"11056_CR43","doi-asserted-by":"publisher","first-page":"0130140","DOI":"10.1371\/journal.pone.0130140","volume":"10","author":"S Bach","year":"2015","unstructured":"Bach S, Binder A, Montavon G, Klauschen F, M\u00fcller K-R, Samek W (2015) On pixel-wise explanations for non-linear classifier decisions by layer-wise relevance propagation. PloS one 10(7):0130140","journal-title":"PloS one"},{"key":"11056_CR44","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.patcog.2016.11.008","volume":"65","author":"G Montavon","year":"2017","unstructured":"Montavon G, Lapuschkin S, Binder A, Samek W, M\u00fcller K-R (2017) Explaining nonlinear classification decisions with deep taylor decomposition. Pattern Recogn 65:211\u2013222. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.patcog.2016.11.008","journal-title":"Pattern Recogn"},{"key":"11056_CR45","doi-asserted-by":"publisher","unstructured":"Chen S, He Z, Sun C, Yang J, Huang X (2020) Universal adversarial attack on attention and the resulting dataset damagenet. IEEE Transact Pattern Anal Mach Intell 1\u20131. https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/TPAMI.2020.3033291","DOI":"10.1109\/TPAMI.2020.3033291"},{"key":"11056_CR46","unstructured":"Zhang T, Zhu Z (2019) Interpreting adversarially trained convolutional neural networks. CoRR arXiv:1905.09797"},{"key":"11056_CR47","doi-asserted-by":"publisher","unstructured":"Iwana BK, Kuroki R, Uchida S (2019) Explaining convolutional neural networks using softmax gradient layer-wise relevance propagation. In: 2019 IEEE\/CVF international conference on computer vision workshop (ICCVW), pp. 4176\u20134185 . https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/ICCVW.2019.00513","DOI":"10.1109\/ICCVW.2019.00513"},{"key":"11056_CR48","unstructured":"Kurakin A, Goodfellow IJ, Bengio S (2016) Adversarial examples in the physical world. CoRR arXiv:1607.02533"},{"key":"11056_CR49","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2018) Towards deep learning models resistant to adversarial attacks. arXiv:1706.06083"},{"key":"11056_CR50","doi-asserted-by":"publisher","unstructured":"Moosavi-Dezfooli S-M, Fawzi A, Frossard P (2016) Deepfool: A simple and accurate method to fool deep neural networks. In: 2016 IEEE conference on computer vision and pattern recognition (CVPR), pp. 2574\u20132582 . https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/CVPR.2016.282","DOI":"10.1109\/CVPR.2016.282"},{"key":"11056_CR51","doi-asserted-by":"crossref","unstructured":"Chen P-Y, Sharma Y, Zhang H, Yi J, Hsieh C-J (2017) EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples. arXiv e-prints, 1709\u201304114 arXiv:1709.04114 [stat.ML]","DOI":"10.1609\/aaai.v32i1.11302"},{"key":"11056_CR52","doi-asserted-by":"publisher","unstructured":"Zhou B, Khosla A, Lapedriza A, Oliva A, Torralba A (2016) Learning deep features for discriminative localization. In: 2016 IEEE conference on computer vision and pattern recognition (CVPR), pp. 2921\u20132929 . https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/CVPR.2016.319","DOI":"10.1109\/CVPR.2016.319"},{"key":"11056_CR53","doi-asserted-by":"publisher","unstructured":"Zeiler MD, Krishnan D, Taylor GW, Fergus R (2010) Deconvolutional networks. In: 2010 IEEE Computer society conference on computer vision and pattern recognition, pp. 2528\u20132535 . https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/CVPR.2010.5539957","DOI":"10.1109\/CVPR.2010.5539957"},{"key":"11056_CR54","doi-asserted-by":"crossref","unstructured":"Xie C, Zhang Z, Zhou Y, Bai S, Wang J, Ren Z, Yuille AL (2019) Improving transferability of adversarial examples with input diversity. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR)","DOI":"10.1109\/CVPR.2019.00284"},{"key":"11056_CR55","doi-asserted-by":"crossref","unstructured":"Wang X, He K (2021) Enhancing the transferability of adversarial attacks through variance tuning. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 1924\u20131933","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"11056_CR56","doi-asserted-by":"crossref","unstructured":"Gu J, Yang Y, Tresp V (2018) Understanding individual decisions of cnns via contrastive backpropagation. In: Asian conference on computer vision, pp. 119\u2013134 . Springer","DOI":"10.1007\/978-3-030-20893-6_8"},{"key":"11056_CR57","doi-asserted-by":"crossref","unstructured":"Dong Y, Pang T, Su H, Zhu J (2019) Evading defenses to transferable adversarial examples by translation-invariant attacks. CoRR arXiv:1904.02884","DOI":"10.1109\/CVPR.2019.00444"},{"key":"11056_CR58","unstructured":"Lin J, Song C, He K, Wang L, Hopcroft JE (2020) Nesterov accelerated gradient and scale invariance for adversarial attacks. In: International conference on learning representations . https:\/\/linproxy.fan.workers.dev:443\/https\/openreview.net\/forum?id=SJlHwkBYDH"},{"key":"11056_CR59","unstructured":"Brendel W, Rauber J, Bethge M (2018) Decision-based adversarial attacks: Reliable attacks against black-box machine learning models. arXiv:1712.04248"},{"key":"11056_CR60","unstructured":"Rozsa A, Boult TE (2019) Improved adversarial robustness by reducing open space risk via tent activations. arXiv preprint arXiv:1908.02435"},{"key":"11056_CR61","unstructured":"Xie C, Tan M, Gong B, Yuille A, Le QV (2020) Smooth adversarial training. arXiv preprint arXiv:2006.14536"}],"container-title":["Neural Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/content\/pdf\/10.1007\/s11063-022-11056-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/article\/10.1007\/s11063-022-11056-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/content\/pdf\/10.1007\/s11063-022-11056-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T16:43:47Z","timestamp":1690821827000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/10.1007\/s11063-022-11056-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,22]]},"references-count":61,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["11056"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s11063-022-11056-5","relation":{},"ISSN":["1370-4621","1573-773X"],"issn-type":[{"value":"1370-4621","type":"print"},{"value":"1573-773X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,22]]},"assertion":[{"value":"12 October 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The data that support the findings of this study are available on request from the corresponding author Zigang Chen or Renjie Dai.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}