{"id":"https://openalex.org/W4408352511","doi":"https://doi.org/10.1109/icassp49660.2025.10887692","title":"DiGradPatch: Black-Box Patch Attacks via Diffusion-Based Double Gradient and Sensitive Distribution Guidance","display_name":"DiGradPatch: Black-Box Patch Attacks via Diffusion-Based Double Gradient and Sensitive Distribution Guidance","publication_year":2025,"publication_date":"2025-03-12","ids":{"openalex":"https://openalex.org/W4408352511","doi":"https://doi.org/10.1109/icassp49660.2025.10887692"},"language":"en","primary_location":{"id":"doi:10.1109/icassp49660.2025.10887692","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp49660.2025.10887692","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065556259","display_name":"Yang Wu","orcid":"https://orcid.org/0000-0001-5288-6796"},"institutions":[{"id":"https://openalex.org/I2722730","display_name":"Inner Mongolia University","ror":"https://ror.org/0106qb496","country_code":"CN","type":"education","lineage":["https://openalex.org/I2722730"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yang Wu","raw_affiliation_strings":["Inner Mongolia University,College of Computer Science,Hohhot,China"],"affiliations":[{"raw_affiliation_string":"Inner Mongolia University,College of Computer Science,Hohhot,China","institution_ids":["https://openalex.org/I2722730"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025149741","display_name":"Jing Liu","orcid":"https://orcid.org/0000-0001-5035-2053"},"institutions":[{"id":"https://openalex.org/I2722730","display_name":"Inner Mongolia University","ror":"https://ror.org/0106qb496","country_code":"CN","type":"education","lineage":["https://openalex.org/I2722730"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Liu","raw_affiliation_strings":["Inner Mongolia University,College of Computer Science,Hohhot,China"],"affiliations":[{"raw_affiliation_string":"Inner Mongolia University,College of Computer Science,Hohhot,China","institution_ids":["https://openalex.org/I2722730"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5065556259"],"corresponding_institution_ids":["https://openalex.org/I2722730"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.02014514,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9598000049591064,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.7162598967552185},{"id":"https://openalex.org/keywords/diffusion","display_name":"Diffusion","score":0.5371860265731812},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.49556171894073486},{"id":"https://openalex.org/keywords/distribution","display_name":"Distribution (mathematics)","score":0.4219939708709717},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.17047074437141418},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1389426290988922},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12039831280708313},{"id":"https://openalex.org/keywords/mathematical-analysis","display_name":"Mathematical analysis","score":0.06800952553749084}],"concepts":[{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.7162598967552185},{"id":"https://openalex.org/C69357855","wikidata":"https://www.wikidata.org/wiki/Q163214","display_name":"Diffusion","level":2,"score":0.5371860265731812},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.49556171894073486},{"id":"https://openalex.org/C110121322","wikidata":"https://www.wikidata.org/wiki/Q865811","display_name":"Distribution (mathematics)","level":2,"score":0.4219939708709717},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.17047074437141418},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1389426290988922},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12039831280708313},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.06800952553749084},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icassp49660.2025.10887692","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp49660.2025.10887692","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322868","display_name":"Natural Science Foundation of Inner Mongolia","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2108598243","https://openalex.org/W2183341477","https://openalex.org/W2194775991","https://openalex.org/W2295107390","https://openalex.org/W2963446712","https://openalex.org/W2964137095","https://openalex.org/W2996950444","https://openalex.org/W2999606423","https://openalex.org/W3036294592","https://openalex.org/W3163478863","https://openalex.org/W3201221410","https://openalex.org/W4206849702","https://openalex.org/W4224247218","https://openalex.org/W4224920313","https://openalex.org/W4307091817","https://openalex.org/W4312918928","https://openalex.org/W4386299120","https://openalex.org/W4392902617","https://openalex.org/W6637373629","https://openalex.org/W6779823529","https://openalex.org/W6863893197"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Deep":[0],"neural":[1],"networks":[2],"have":[3],"demonstrated":[4],"vulnerabilities":[5],"to":[6,31,45,78,99,154,207],"black-box":[7,127],"adversarial":[8,82,165],"patch":[9,33,42,103,128,169],"attacks":[10],"in":[11,20,40,142],"image":[12,117],"analysis":[13],"tasks,":[14],"raising":[15],"concerns":[16],"about":[17],"their":[18],"robustness":[19],"safety-critical":[21],"applications.":[22],"Current":[23],"methods":[24],"typically":[25],"rely":[26],"on":[27,185],"randomized":[28],"search":[29],"strategies":[30],"determine":[32],"locations":[34],"and":[35,49,69,115,217],"apply":[36],"unrestricted":[37],"pixel":[38],"perturbations":[39,166],"the":[41,91,102,106,111,122,126,132,139,145,149,156,162,168,174,186,233],"area,":[43],"leading":[44],"high":[46,202],"query":[47,86,198],"costs":[48],"significant":[50],"visual":[51],"distortions":[52],"that":[53,171,190,224],"reduce":[54],"imperceptibility.":[55],"To":[56],"address":[57],"these":[58],"limitations,":[59],"we":[60,120],"propose":[61],"Black-Box":[62],"Patch":[63],"Attacks":[64],"via":[65],"Diffusion-Based":[66],"Double":[67],"Gradient":[68],"Sensitive":[70],"Distribution":[71],"Guidance":[72],"(DiGradPatch),":[73],"a":[74,96,201],"novel":[75],"method":[76],"designed":[77],"generate":[79],"highly":[80],"imperceptible":[81],"samples":[83],"with":[84,144,173,195],"minimal":[85],"cost.":[87],"Our":[88],"approach":[89,211],"leverages":[90],"prior":[92,136],"sensitive":[93],"distribution":[94,109,175],"of":[95,148,158,164,176,228],"surrogate":[97],"model":[98,113,124],"efficiently":[100],"locate":[101],"by":[104],"maximizing":[105],"joint":[107],"probability":[108],"between":[110],"global":[112],"prediction":[114],"selected":[116],"regions.":[118],"Furthermore,":[119],"introduce":[121],"diffusion":[123,140],"into":[125],"attack":[129,203,235],"framework":[130],"for":[131],"first":[133],"time.":[134],"The":[135],"gradient":[137,147],"from":[138],"model,":[141,151],"conjunction":[143],"estimated":[146],"target":[150],"is":[152,225],"used":[153],"guide":[155],"direction":[157],"perturbations.":[159],"This":[160],"allows":[161],"generation":[163],"within":[167],"area":[170],"align":[172],"natural":[177],"samples,":[178],"effectively":[179],"reducing":[180],"perceptual":[181],"distortions.":[182],"Extensive":[183],"experiments":[184],"ImageNet":[187],"dataset":[188],"show":[189],"DiGradPatch":[191],"achieves":[192,218],"superior":[193],"imperceptibility":[194],"significantly":[196],"reduced":[197],"costs,":[199],"maintaining":[200,232],"success":[204,236],"rate.":[205,237],"Compared":[206],"existing":[208],"methods,":[209],"our":[210],"requires":[212],"fewer":[213],"than":[214],"10":[215],"queries":[216],"an":[219],"L<inf":[220],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[221],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">\u221e</inf>":[222],"norm":[223],"only":[226],"1/10":[227],"state-of-the-art":[229],"techniques,":[230],"while":[231],"highest":[234]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
