{"id":"https://openalex.org/W4408325163","doi":"https://doi.org/10.1109/globecom52923.2024.10901342","title":"From the Perspective of AI Safety: Analyzing the Impact of XAI Performance on Adversarial Attack","display_name":"From the Perspective of AI Safety: Analyzing the Impact of XAI Performance on Adversarial Attack","publication_year":2024,"publication_date":"2024-12-08","ids":{"openalex":"https://openalex.org/W4408325163","doi":"https://doi.org/10.1109/globecom52923.2024.10901342"},"language":"en","primary_location":{"id":"doi:10.1109/globecom52923.2024.10901342","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom52923.2024.10901342","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2024 - 2024 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087568651","display_name":"Abdullah M. Asiri","orcid":"https://orcid.org/0000-0001-7905-3209"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Ahmed Asiri","raw_affiliation_strings":["University of Technology Sydney,School of Computer Science,Sydney,Australia"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney,School of Computer Science,Sydney,Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103150943","display_name":"Feng Wu","orcid":"https://orcid.org/0000-0001-7266-5579"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Feng Wu","raw_affiliation_strings":["University of Technology Sydney,School of Computer Science,Sydney,Australia"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney,School of Computer Science,Sydney,Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059567156","display_name":"Zhiyi Tian","orcid":"https://orcid.org/0000-0001-8905-0941"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Zhiyi Tian","raw_affiliation_strings":["University of Technology Sydney,School of Computer Science,Sydney,Australia"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney,School of Computer Science,Sydney,Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["University of Technology Sydney,School of Computer Science,Sydney,Australia"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney,School of Computer Science,Sydney,Australia","institution_ids":["https://openalex.org/I114017466"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5087568651"],"corresponding_institution_ids":["https://openalex.org/I114017466"],"apc_list":null,"apc_paid":null,"fwci":0.6946,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.78088192,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"4982","last_page":"4987"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9664999842643738,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9664999842643738,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8669538497924805},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.8156227469444275},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5870119333267212},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3219192624092102},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32062309980392456}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8669538497924805},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.8156227469444275},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5870119333267212},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3219192624092102},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32062309980392456}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom52923.2024.10901342","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom52923.2024.10901342","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2024 - 2024 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5299999713897705,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2194775991","https://openalex.org/W2798302089","https://openalex.org/W2888003123","https://openalex.org/W2891503716","https://openalex.org/W2919491917","https://openalex.org/W2962700793","https://openalex.org/W3040741943","https://openalex.org/W3109945983","https://openalex.org/W3162744106","https://openalex.org/W3171579381","https://openalex.org/W3174400490","https://openalex.org/W4296005783","https://openalex.org/W4313023660","https://openalex.org/W4385059984","https://openalex.org/W4385454777","https://openalex.org/W6640425456","https://openalex.org/W6782282330"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492"],"abstract_inverted_index":{"The":[0,66],"outstanding":[1],"performance":[2],"of":[3,31,37,51,68,74,86,98,105,135,169],"machine":[4],"learning":[5],"models":[6],"across":[7],"various":[8],"fields":[9],"enables":[10],"them":[11],"to":[12,58,81,109,115,131,153,159],"be":[13],"used":[14],"in":[15,62],"sensitive":[16],"and":[17,25,34,71,84,96,148],"high-risk":[18],"activities":[19],"such":[20,101,154],"as":[21,102,127,166],"healthcare,":[22],"automated":[23],"driving,":[24],"security":[26,85],"services.":[27],"However,":[28],"the":[29,35,49,72,82,91,94,103,106,124,133,136,145,150,160,167,173,177],"explainability":[30,83,95],"their":[32,38],"outputs":[33],"safety":[36,97],"operation":[39],"are":[40,77],"major":[41],"concerns.":[42,118],"Although":[43],"Explainable":[44],"AI":[45,52],"(XAI)":[46],"can":[47],"enhance":[48],"interpretability":[50],"models,":[53],"further":[54],"research":[55],"is":[56,113],"necessary":[57],"evaluate":[59],"its":[60,183],"effectiveness":[61],"explaining":[63],"adversarial":[64,75,111,142],"attacks.":[65],"use":[67,123],"XAI":[69,107,129],"techniques":[70],"rise":[73],"attacks":[76],"important":[78],"issues":[79],"related":[80,152],"deep":[87,99],"learning,":[88,100],"respectively.":[89],"Furthermore,":[90],"relation":[92],"between":[93],"vulnerability":[104,151],"explanation":[108,156],"an":[110,128,155],"attack,":[112],"key":[114],"unlocking":[116],"these":[117],"In":[119],"this":[120],"paper,":[121],"we":[122],"Saliency":[125,178],"Map":[126,179],"technique":[130],"explain":[132],"behavior":[134],"Fast":[137],"Gradient":[138],"Sign":[139],"Method":[140],"(FGSM)":[141],"attack":[143,171],"on":[144,172],"ResNet":[146,174],"model,":[147],"show":[149,164],"with":[157],"respect":[158],"attack.":[161],"Extensive":[162],"experiments":[163],"that":[165],"severity":[168],"FGSM":[170],"model":[175],"increases,":[176],"gradually":[180],"fails,":[181],"exposing":[182],"potential":[184],"vulnerability.":[185]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-01T17:29:45.350535","created_date":"2025-10-10T00:00:00"}
