{"id":"https://openalex.org/W4415708215","doi":"https://doi.org/10.1109/icme59968.2025.11209495","title":"Adversarial Examples Detection Based on Adversarial Attack Sensitivity","display_name":"Adversarial Examples Detection Based on Adversarial Attack Sensitivity","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4415708215","doi":"https://doi.org/10.1109/icme59968.2025.11209495"},"language":null,"primary_location":{"id":"doi:10.1109/icme59968.2025.11209495","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme59968.2025.11209495","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Multimedia and Expo (ICME)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067190875","display_name":"Cong Ming","orcid":null},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Cong Ming","raw_affiliation_strings":["School of Cyber Science and Technology, University of Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034730224","display_name":"Haojie Yuan","orcid":"https://orcid.org/0000-0003-3027-3109"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haojie Yuan","raw_affiliation_strings":["School of Cyber Science and Technology, University of Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007901358","display_name":"Xiangwen Wang","orcid":"https://orcid.org/0009-0004-3322-6265"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangwen Wang","raw_affiliation_strings":["School of Cyber Science and Technology, University of Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045938154","display_name":"Qi Chu","orcid":"https://orcid.org/0000-0003-3028-0755"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Chu","raw_affiliation_strings":["School of Cyber Science and Technology, University of Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114910706","display_name":"Tao Gong","orcid":"https://orcid.org/0000-0003-0026-6813"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Gong","raw_affiliation_strings":["School of Cyber Science and Technology, University of Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100395493","display_name":"Bin Liu","orcid":"https://orcid.org/0000-0002-3977-8800"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Liu","raw_affiliation_strings":["School of Cyber Science and Technology, University of Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090634503","display_name":"Nenghai Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nenghai Yu","raw_affiliation_strings":["School of Cyber Science and Technology, University of Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China","institution_ids":["https://openalex.org/I126520041"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5067190875"],"corresponding_institution_ids":["https://openalex.org/I126520041"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1643466,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.0007999999797903001,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.00019999999494757503,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.9725000262260437},{"id":"https://openalex.org/keywords/generalizability-theory","display_name":"Generalizability theory","score":0.646399974822998},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5490999817848206},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.42640000581741333},{"id":"https://openalex.org/keywords/sensitivity","display_name":"Sensitivity (control systems)","score":0.4187000095844269},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.4147000014781952}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.9725000262260437},{"id":"https://openalex.org/C27158222","wikidata":"https://www.wikidata.org/wiki/Q5532422","display_name":"Generalizability theory","level":2,"score":0.646399974822998},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6209999918937683},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.586899995803833},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5490999817848206},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.45739999413490295},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.42640000581741333},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.4187000095844269},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.4147000014781952},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.36480000615119934},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.358599990606308},{"id":"https://openalex.org/C42023084","wikidata":"https://www.wikidata.org/wiki/Q5249231","display_name":"Decision boundary","level":3,"score":0.32510000467300415},{"id":"https://openalex.org/C177918212","wikidata":"https://www.wikidata.org/wiki/Q803623","display_name":"Perturbation (astronomy)","level":2,"score":0.26579999923706055},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2597000002861023}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icme59968.2025.11209495","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme59968.2025.11209495","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Multimedia and Expo (ICME)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2108598243","https://openalex.org/W2194775991","https://openalex.org/W2607219512","https://openalex.org/W2618043096","https://openalex.org/W2774644650","https://openalex.org/W2943723147","https://openalex.org/W2947133760","https://openalex.org/W2963446712","https://openalex.org/W2963612069","https://openalex.org/W2963693747","https://openalex.org/W2963857521","https://openalex.org/W2990237009","https://openalex.org/W3162712668","https://openalex.org/W4301880089"],"related_works":[],"abstract_inverted_index":{"Deep":[0],"neural":[1],"networks":[2],"have":[3],"found":[4],"widespread":[5],"application":[6],"in":[7],"critical":[8],"fields":[9],"but":[10,27],"remain":[11],"vulnerable":[12],"to":[13,20,33,65,96,103],"adversarial":[14,49,86,112,121,137],"attacks.":[15,35],"Existing":[16],"detection":[17,148],"methods":[18],"aim":[19],"achieve":[21],"defense":[22],"without":[23],"modifying":[24],"the":[25,42,63,66,90,101,104,126],"model,":[26],"they":[28],"generally":[29],"struggle":[30],"with":[31],"generalization":[32],"unseen":[34,136],"To":[36],"address":[37],"this":[38,71],"limitation,":[39],"we":[40,73],"investigate":[41],"underlying":[43],"principles":[44],"of":[45,92,120,130],"max-loss":[46],"and":[47,51,62,128,134,146],"min-distance":[48],"attacks":[50,87,113],"uncover":[52],"a":[53,81,93,144],"strong":[54],"positive":[55],"correlation":[56],"between":[57],"perturbation":[58,97],"magnitude,":[59],"prediction":[60],"confidence,":[61],"distance":[64,102],"decision":[67,105],"boundary.":[68],"Building":[69],"on":[70,114],"insight,":[72],"introduce":[74],"Adversarial":[75,78],"Detection":[76],"via":[77],"Sensitivity":[79],"(ADAS),":[80],"novel":[82],"approach":[83],"that":[84],"detects":[85],"by":[88,110],"analyzing":[89],"sensitivity":[91,108],"model's":[94],"predictions":[95],"magnitude.":[98],"ADAS":[99,131],"estimates":[100],"boundary":[106],"through":[107],"analysis":[109],"simulating":[111],"input":[115],"samples,":[116],"identifying":[117],"anomalies":[118],"indicative":[119],"manipulation.":[122],"Extensive":[123],"experiments":[124],"demonstrate":[125],"robustness":[127],"generalizability":[129],"across":[132],"diverse":[133],"previously":[135],"attack":[138],"scenarios,":[139],"establishing":[140],"its":[141],"efficacy":[142],"as":[143],"versatile":[145],"reliable":[147],"framework.":[149]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-30T00:00:00"}
