{"id":"https://openalex.org/W4400439085","doi":"https://doi.org/10.1007/978-3-031-63787-2_6","title":"Unveiling the\u00a0Anatomy of\u00a0Adversarial Attacks: Concept-Based XAI Dissection of\u00a0CNNs","display_name":"Unveiling the\u00a0Anatomy of\u00a0Adversarial Attacks: Concept-Based XAI Dissection of\u00a0CNNs","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4400439085","doi":"https://doi.org/10.1007/978-3-031-63787-2_6"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-63787-2_6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-63787-2_6","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-63787-2_6.pdf","source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-63787-2_6.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086750364","display_name":"Georgii Mikriukov","orcid":"https://orcid.org/0000-0002-2494-6285"},"institutions":[{"id":"https://openalex.org/I147869694","display_name":"Continental (Germany)","ror":"https://ror.org/0359s0245","country_code":"DE","type":"company","lineage":["https://openalex.org/I147869694"]},{"id":"https://openalex.org/I4210089758","display_name":"Anhalt University of Applied Sciences","ror":"https://ror.org/0076zct58","country_code":"DE","type":"education","lineage":["https://openalex.org/I4210089758"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Georgii Mikriukov","raw_affiliation_strings":["Continental AG, Hanover, Germany","Hochschule Anhalt, K\u00f6then, Germany"],"raw_orcid":"https://orcid.org/0000-0002-2494-6285","affiliations":[{"raw_affiliation_string":"Continental AG, Hanover, Germany","institution_ids":["https://openalex.org/I147869694"]},{"raw_affiliation_string":"Hochschule Anhalt, K\u00f6then, Germany","institution_ids":["https://openalex.org/I4210089758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028540603","display_name":"Gesina Schwalbe","orcid":"https://orcid.org/0000-0003-2690-2478"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Gesina Schwalbe","raw_affiliation_strings":["University of L\u00fcbeck, L\u00fcbeck, Germany"],"raw_orcid":"https://orcid.org/0000-0003-2690-2478","affiliations":[{"raw_affiliation_string":"University of L\u00fcbeck, L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5094255745","display_name":"Franz Motzkus","orcid":"https://orcid.org/0009-0009-4362-7907"},"institutions":[{"id":"https://openalex.org/I147869694","display_name":"Continental (Germany)","ror":"https://ror.org/0359s0245","country_code":"DE","type":"company","lineage":["https://openalex.org/I147869694"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Franz Motzkus","raw_affiliation_strings":["Continental AG, Hanover, Germany"],"raw_orcid":"https://orcid.org/0009-0009-4362-7907","affiliations":[{"raw_affiliation_string":"Continental AG, Hanover, Germany","institution_ids":["https://openalex.org/I147869694"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061571644","display_name":"Korinna Bade","orcid":"https://orcid.org/0000-0001-9139-8947"},"institutions":[{"id":"https://openalex.org/I4210089758","display_name":"Anhalt University of Applied Sciences","ror":"https://ror.org/0076zct58","country_code":"DE","type":"education","lineage":["https://openalex.org/I4210089758"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Korinna Bade","raw_affiliation_strings":["Hochschule Anhalt, K\u00f6then, Germany"],"raw_orcid":"https://orcid.org/0000-0001-9139-8947","affiliations":[{"raw_affiliation_string":"Hochschule Anhalt, K\u00f6then, Germany","institution_ids":["https://openalex.org/I4210089758"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5086750364"],"corresponding_institution_ids":["https://openalex.org/I147869694","https://openalex.org/I4210089758"],"apc_list":null,"apc_paid":null,"fwci":2.2469,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.88334132,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"92","last_page":"116"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.904955267906189},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7200828790664673},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6978239417076111},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6542553901672363},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5667780637741089},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.523473858833313},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.4844953715801239},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47189176082611084},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4587576389312744},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4391607642173767},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.07797887921333313},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.060186177492141724}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.904955267906189},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7200828790664673},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6978239417076111},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6542553901672363},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5667780637741089},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.523473858833313},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.4844953715801239},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47189176082611084},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4587576389312744},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4391607642173767},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.07797887921333313},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.060186177492141724},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-031-63787-2_6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-63787-2_6","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-63787-2_6.pdf","source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-3-031-63787-2_6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-63787-2_6","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-63787-2_6.pdf","source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4400439085.pdf"},"referenced_works_count":40,"referenced_works":["https://openalex.org/W2108598243","https://openalex.org/W2194775991","https://openalex.org/W2602856279","https://openalex.org/W2796885425","https://openalex.org/W2798302089","https://openalex.org/W2884367402","https://openalex.org/W2888570478","https://openalex.org/W2945976633","https://openalex.org/W2962843949","https://openalex.org/W2963542245","https://openalex.org/W2963564844","https://openalex.org/W2963610729","https://openalex.org/W2963749936","https://openalex.org/W2963857521","https://openalex.org/W2969224142","https://openalex.org/W2972441196","https://openalex.org/W2982083293","https://openalex.org/W3001927475","https://openalex.org/W3034283173","https://openalex.org/W3034776267","https://openalex.org/W3090855408","https://openalex.org/W3100300767","https://openalex.org/W3127493833","https://openalex.org/W3157574776","https://openalex.org/W3174885665","https://openalex.org/W3191453585","https://openalex.org/W3211999566","https://openalex.org/W4229494842","https://openalex.org/W4297896551","https://openalex.org/W4312865422","https://openalex.org/W4313023660","https://openalex.org/W4313650676","https://openalex.org/W4318465326","https://openalex.org/W4385815564","https://openalex.org/W4386076059","https://openalex.org/W4387818725","https://openalex.org/W4388907048","https://openalex.org/W6600062588","https://openalex.org/W6600466347","https://openalex.org/W6637162671"],"related_works":["https://openalex.org/W4226493464","https://openalex.org/W4312417841","https://openalex.org/W3193565141","https://openalex.org/W3133861977","https://openalex.org/W2950183588","https://openalex.org/W3080754722","https://openalex.org/W4383221314","https://openalex.org/W2951211570","https://openalex.org/W3103566983","https://openalex.org/W3167935049"],"abstract_inverted_index":{"Abstract":[0],"Adversarial":[1],"attacks":[2,22],"(AAs)":[3],"pose":[4],"a":[5,122,130,152],"significant":[6],"threat":[7],"to":[8],"the":[9,18,33,53,58,97,101,112,137,169,180,183],"reliability":[10],"and":[11,36,82,160,173,188],"robustness":[12],"of":[13,20,52,55,76,125,132,171,185],"deep":[14,190],"neural":[15,63],"networks.":[16],"While":[17],"impact":[19,175],"these":[21,39,133,144],"on":[23,32,57,176],"model":[24],"predictions":[25],"has":[26],"been":[27],"extensively":[28],"studied,":[29],"their":[30,174],"effect":[31],"learned":[34,60,177],"representations":[35],"concepts":[37,59,106],"within":[38,100],"models":[40],"remains":[41],"largely":[42],"unexplored.":[43],"In":[44],"this":[45],"work,":[46],"we":[47,86,141],"perform":[48],"an":[49,73],"in-depth":[50],"analysis":[51],"influence":[54],"AAs":[56,92,172],"by":[61],"convolutional":[62],"networks":[64],"(CNNs)":[65],"using":[66],"eXplainable":[67],"artificial":[68],"intelligence":[69],"(XAI)":[70],"techniques.":[71],"Through":[72],"extensive":[74],"set":[75,124],"experiments":[77],"across":[78],"various":[79],"network":[80],"architectures":[81],"targeted":[83],"AA":[84,158],"techniques,":[85],"unveil":[87],"several":[88],"key":[89],"findings.":[90],"First,":[91],"induce":[93],"substantial":[94],"alterations":[95],"in":[96],"concept":[98],"composition":[99],"feature":[102],"space,":[103],"introducing":[104],"new":[105],"or":[107],"modifying":[108],"existing":[109],"ones.":[110],"Second,":[111],"adversarial":[113,199],"perturbation":[114],"operation":[115],"itself":[116],"can":[117],"be":[118],"linearly":[119],"decomposed":[120],"into":[121,168],"global":[123],"latent":[126],"vector":[127],"components,":[128],"with":[129],"subset":[131],"being":[134],"responsible":[135],"for":[136,151,182],"attack\u2019s":[138],"success.":[139],"Notably,":[140],"discover":[142],"that":[143],"components":[145],"are":[146,149],"target-specific,":[147],"i.e.,":[148],"similar":[150],"given":[153],"target":[154],"class":[155],"throughout":[156],"different":[157],"techniques":[159],"starting":[161],"classes.":[162],"Our":[163],"findings":[164],"provide":[165],"valuable":[166],"insights":[167],"nature":[170],"representations,":[178],"paving":[179],"way":[181],"development":[184],"more":[186],"robust":[187],"interpretable":[189],"learning":[191],"models,":[192],"as":[193,195],"well":[194],"effective":[196],"defenses":[197],"against":[198],"threats.":[200]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
