{"id":"https://openalex.org/W4416649832","doi":"https://doi.org/10.1109/access.2025.3636942","title":"RNAF: ResilienceNet Adversarial Framework Using Deep Reinforcement Learning for Adversarial Attacks on Digital Images","display_name":"RNAF: ResilienceNet Adversarial Framework Using Deep Reinforcement Learning for Adversarial Attacks on Digital Images","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4416649832","doi":"https://doi.org/10.1109/access.2025.3636942"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3636942","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3636942","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3636942","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022164147","display_name":"Kainat Rizwan","orcid":null},"institutions":[{"id":"https://openalex.org/I505182","display_name":"National Textile University","ror":"https://ror.org/030dak672","country_code":"PK","type":"education","lineage":["https://openalex.org/I505182"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Kainat Rizwan","raw_affiliation_strings":["Department of Computer Science, National Textile University, Faisalabad, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Textile University, Faisalabad, Pakistan","institution_ids":["https://openalex.org/I505182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089348789","display_name":"Muhammad Asif Habib","orcid":"https://orcid.org/0000-0002-2675-1975"},"institutions":[{"id":"https://openalex.org/I240666556","display_name":"Imam Mohammad ibn Saud Islamic University","ror":"https://ror.org/05gxjyb39","country_code":"SA","type":"education","lineage":["https://openalex.org/I240666556"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Muhammad Asif Habib","raw_affiliation_strings":["College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-2675-1975","affiliations":[{"raw_affiliation_string":"College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I240666556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091805322","display_name":"Salman Raza","orcid":"https://orcid.org/0000-0003-4895-9512"},"institutions":[{"id":"https://openalex.org/I505182","display_name":"National Textile University","ror":"https://ror.org/030dak672","country_code":"PK","type":"education","lineage":["https://openalex.org/I505182"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Salman Raza","raw_affiliation_strings":["Department of Computer Science, National Textile University, Faisalabad, Pakistan"],"raw_orcid":"https://orcid.org/0000-0003-4895-9512","affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Textile University, Faisalabad, Pakistan","institution_ids":["https://openalex.org/I505182"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055899490","display_name":"Mudassar Ahmad","orcid":"https://orcid.org/0000-0002-6366-8230"},"institutions":[{"id":"https://openalex.org/I505182","display_name":"National Textile University","ror":"https://ror.org/030dak672","country_code":"PK","type":"education","lineage":["https://openalex.org/I505182"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Mudassar Ahmad","raw_affiliation_strings":["Department of Computer Science, National Textile University, Faisalabad, Pakistan"],"raw_orcid":"https://orcid.org/0000-0002-6366-8230","affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Textile University, Faisalabad, Pakistan","institution_ids":["https://openalex.org/I505182"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5022164147"],"corresponding_institution_ids":["https://openalex.org/I505182"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.9995,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.90710896,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"13","issue":null,"first_page":"201592","last_page":"201610"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.002199999988079071,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11105","display_name":"Advanced Image Processing Techniques","score":0.0012000000569969416,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8877999782562256},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5526000261306763},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5430999994277954},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.5024999976158142},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3919999897480011},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.3781999945640564},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.37400001287460327},{"id":"https://openalex.org/keywords/contextual-image-classification","display_name":"Contextual image classification","score":0.37130001187324524}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8877999782562256},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7982000112533569},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6442000269889832},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5526000261306763},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5430999994277954},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.5024999976158142},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.47099998593330383},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3919999897480011},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.3781999945640564},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.37400001287460327},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.37130001187324524},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3294999897480011},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3248000144958496},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.31700000166893005},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.3091000020503998},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.29580000042915344},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.28790000081062317},{"id":"https://openalex.org/C153258448","wikidata":"https://www.wikidata.org/wiki/Q1199743","display_name":"Gradient descent","level":3,"score":0.2849999964237213},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.27630001306533813},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.259799987077713}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3636942","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3636942","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:62d7bd3e18394a4292c3a3d083003737","is_oa":true,"landing_page_url":"https://doaj.org/article/62d7bd3e18394a4292c3a3d083003737","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 201592-201610 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3636942","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3636942","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Adversarial":[0,110,185],"attack":[1],"is":[2,71,78,165,189,208,275,304],"a":[3,125,182,247,284,293,314],"key":[4],"concern":[5],"for":[6,320],"state-of-the-art":[7],"artificial":[8],"intelligence":[9],"(AI),":[10],"especially":[11],"those":[12],"used":[13],"in":[14,25,81,121,191,199,210,264,300,317],"image":[15,321],"classification":[16],"and":[17,33,39,56,83,95,127,193,223,234,252,270,289],"computer":[18],"vision.":[19],"These":[20],"attacks":[21,227],"exploit":[22],"minute":[23],"changes":[24],"input,":[26],"deceiving":[27],"models":[28,219,263],"into":[29],"predicting":[30],"incorrect":[31],"outcomes":[32],"thereby":[34],"compromising":[35],"the":[36,69,107,146,173,200,278],"accuracy,":[37],"reliability,":[38],"security":[40],"of":[41,66,163,168,203,212,220,250,255,281],"AI-driven":[42],"decision-making.":[43],"This":[44,273],"opening":[45],"leads":[46],"to":[47,51,73,100,123,130,143,148,197],"concerns":[48],"with":[49,216],"respect":[50],"facial":[52],"recognition,":[53],"autonomous":[54],"driving,":[55],"even":[57],"digital":[58],"forensics,":[59],"as":[60,229],"these":[61],"are":[62],"all":[63],"high-stakes":[64],"areas":[65],"interest.":[67],"Although":[68],"research":[70],"starting":[72],"increase,":[74],"an":[75,131,242,305],"unfilled":[76],"gap":[77],"being":[79],"faced":[80],"strong":[82],"adaptive":[84,169,282,306],"defense":[85,113,288,307],"mechanisms":[86,157],"that":[87,115,171],"could":[88],"support":[89],"real-time":[90],"resistance":[91],"against":[92,309],"both":[93],"poisons":[94],"evasion-based":[96],"attackers.":[97],"In":[98,134],"order":[99,122],"overcome":[101],"this":[102],"vulnerability":[103],"factor,":[104],"we":[105],"offer":[106],"new":[108,315],"ResilienceNet":[109],"Framework":[111],"(RNAF)":[112],"architecture":[114],"incorporates":[116],"Deep":[117],"Reinforcement":[118],"Learning":[119],"(DRL)":[120],"generate":[124],"dynamic":[126,285],"intelligent":[128],"countermeasure":[129],"adversarial":[132,149,195,226,253,291],"attack.":[133],"its":[135,155,166,204,312],"process,":[136],"RNAF":[137,164,207,215,245,259,303],"memorizes":[138],"Proximal":[139],"Policy":[140],"Optimization":[141],"(PPO)":[142],"constantly":[144],"subject":[145],"model":[147],"environments,":[150],"so":[151],"it":[152],"can":[153,260],"adjust":[154],"protection":[156],"during":[158],"training.":[159],"Another":[160],"exclusive":[161],"feature":[162],"module":[167],"steganalysis":[170],"improves":[172],"detection":[174],"process":[175],"by":[176],"discovering":[177],"concealed":[178],"malignant":[179],"elements":[180],"on":[181,214,225,241,277],"pixel-by-pixel":[183],"basis.":[184],"Robustness":[186],"Toolbox":[187],"(ART)":[188],"employed":[190],"creating":[192],"identifying":[194],"perturbations":[196],"aid":[198],"various":[201],"evaluations":[202],"robust":[205,318],"systems.":[206],"compared":[209],"terms":[211],"CIFAR-10":[213],"other":[217],"existing":[218],"ResNet50,":[221],"VGG16,":[222],"Timm":[224],"such":[228,265],"Projected":[230],"Gradient":[231,236],"Descent":[232],"(PGD)":[233],"Fast":[235],"Sign":[237],"Method":[238],"(FGSM).":[239],"Based":[240],"experimental":[243],"study,":[244],"yields":[246],"clean":[248],"accuracy":[249,254],"95.7":[251],"88.0,":[256],"which":[257,295],"demonstrates":[258],"outperform":[261],"baseline":[262],"robustness,":[266],"precision-recall,":[267],"F1":[268],"score,":[269],"ROC-AUC":[271],"measures.":[272],"innovation":[274],"based":[276],"unique":[279],"combination":[280,294],"steganalysis,":[283],"PPO-based":[286],"patch":[287],"ART-based":[290],"learning,":[292],"has":[296],"not":[297],"been":[298],"studied":[299],"prior":[301],"literature.":[302],"approach":[308],"evolving":[310],"threats,":[311],"setting":[313],"standard":[316],"AI":[319],"systems":[322],"unlike":[323],"traditional":[324],"approaches":[325],"before.":[326]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-05-13T08:25:38.343686","created_date":"2025-11-25T00:00:00"}
