{"id":"https://openalex.org/W4416250911","doi":"https://doi.org/10.1109/ijcnn64981.2025.11228300","title":"Cascade Adversarial Attack Search","display_name":"Cascade Adversarial Attack Search","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4416250911","doi":"https://doi.org/10.1109/ijcnn64981.2025.11228300"},"language":null,"primary_location":{"id":"doi:10.1109/ijcnn64981.2025.11228300","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11228300","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067321586","display_name":"Ziwen Wang","orcid":"https://orcid.org/0009-0005-1552-3976"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ziwen Wang","raw_affiliation_strings":["Anhui University,School of Computer Science and Technology,China"],"affiliations":[{"raw_affiliation_string":"Anhui University,School of Computer Science and Technology,China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004982483","display_name":"Ding-Lan Shen","orcid":"https://orcid.org/0000-0001-7690-5293"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Daoli Shen","raw_affiliation_strings":["Anhui University,School of Electrical Engineering and Automation,China"],"affiliations":[{"raw_affiliation_string":"Anhui University,School of Electrical Engineering and Automation,China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108936963","display_name":"Xiangkun Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangkun Sun","raw_affiliation_strings":["Anhui University,School of Computer Science and Technology,China"],"affiliations":[{"raw_affiliation_string":"Anhui University,School of Computer Science and Technology,China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038215318","display_name":"Shangshang Yang","orcid":"https://orcid.org/0000-0003-0837-5424"},"institutions":[{"id":"https://openalex.org/I4210164862","display_name":"Artificial Intelligence in Medicine (Canada)","ror":"https://ror.org/05p590m36","country_code":"CA","type":"company","lineage":["https://openalex.org/I4210164862"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Shangshang Yang","raw_affiliation_strings":["Anhui University,School of Artificial Intelligence,China"],"affiliations":[{"raw_affiliation_string":"Anhui University,School of Artificial Intelligence,China","institution_ids":["https://openalex.org/I4210164862"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100804545","display_name":"Xiaoshan Yu","orcid":"https://orcid.org/0000-0001-8550-5697"},"institutions":[{"id":"https://openalex.org/I4210164862","display_name":"Artificial Intelligence in Medicine (Canada)","ror":"https://ror.org/05p590m36","country_code":"CA","type":"company","lineage":["https://openalex.org/I4210164862"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xiaoshan Yu","raw_affiliation_strings":["Anhui University,School of Artificial Intelligence,China"],"affiliations":[{"raw_affiliation_string":"Anhui University,School of Artificial Intelligence,China","institution_ids":["https://openalex.org/I4210164862"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058755242","display_name":"Ye Tian","orcid":"https://orcid.org/0000-0002-3487-5126"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ye Tian","raw_affiliation_strings":["Anhui University,School of Computer Science and Technology,China"],"affiliations":[{"raw_affiliation_string":"Anhui University,School of Computer Science and Technology,China","institution_ids":["https://openalex.org/I143868143"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5067321586"],"corresponding_institution_ids":["https://openalex.org/I143868143"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19438461,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9793000221252441,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9793000221252441,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.003100000089034438,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.002099999925121665,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8174999952316284},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6676999926567078},{"id":"https://openalex.org/keywords/hyperparameter","display_name":"Hyperparameter","score":0.5539000034332275},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.510699987411499},{"id":"https://openalex.org/keywords/cascade","display_name":"Cascade","score":0.47929999232292175},{"id":"https://openalex.org/keywords/transferability","display_name":"Transferability","score":0.4659000039100647}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8174999952316284},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6676999926567078},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6399999856948853},{"id":"https://openalex.org/C8642999","wikidata":"https://www.wikidata.org/wiki/Q4171168","display_name":"Hyperparameter","level":2,"score":0.5539000034332275},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.510699987411499},{"id":"https://openalex.org/C34146451","wikidata":"https://www.wikidata.org/wiki/Q5048094","display_name":"Cascade","level":2,"score":0.47929999232292175},{"id":"https://openalex.org/C61272859","wikidata":"https://www.wikidata.org/wiki/Q7834031","display_name":"Transferability","level":3,"score":0.4659000039100647},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4447999894618988},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41749998927116394},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3353999853134155},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.3237000107765198},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32260000705718994},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3181999921798706},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.2694000005722046},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2605000138282776},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.257999986410141}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn64981.2025.11228300","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11228300","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W2102539288","https://openalex.org/W2180612164","https://openalex.org/W2194775991","https://openalex.org/W2243397390","https://openalex.org/W2309832917","https://openalex.org/W2549139847","https://openalex.org/W2603766943","https://openalex.org/W2618530766","https://openalex.org/W2746600820","https://openalex.org/W2774644650","https://openalex.org/W2945790622","https://openalex.org/W2962847335","https://openalex.org/W2963446712","https://openalex.org/W2963542245","https://openalex.org/W2963626858","https://openalex.org/W2963693747","https://openalex.org/W2963857521","https://openalex.org/W2964024268","https://openalex.org/W2964152294","https://openalex.org/W2966284335","https://openalex.org/W3133727220","https://openalex.org/W3171288285","https://openalex.org/W3174400490","https://openalex.org/W4246193833","https://openalex.org/W4298001211","https://openalex.org/W4380742184","https://openalex.org/W4387848623","https://openalex.org/W4387910965","https://openalex.org/W4390533460","https://openalex.org/W4398133596","https://openalex.org/W4399118820","https://openalex.org/W4400413686","https://openalex.org/W4400680060","https://openalex.org/W4401863607"],"related_works":[],"abstract_inverted_index":{"Adversarial":[0,101],"attack":[1,46,122,138,144,149,167,174],"is":[2],"a":[3,38,99,116,131],"technique":[4],"that":[5,62,154],"introduces":[6],"small":[7],"and":[8,30,54,84,90,125],"imperceptible":[9],"perturbations":[10],"into":[11],"input":[12],"data":[13,91],"to":[14,19,50,81,134,141],"force":[15],"deep":[16],"neural":[17],"networks":[18],"make":[20],"incorrect":[21],"predictions.":[22],"This":[23],"not":[24,163],"only":[25,164],"helps":[26],"assess":[27],"model":[28,73],"robustness":[29],"security":[31],"but":[32,170],"also":[33,171],"reveals":[34],"potential":[35],"vulnerabilities,":[36],"providing":[37],"foundation":[39],"for":[40,70],"optimizing":[41],"defense":[42,56],"mechanisms.":[43],"However,":[44],"single-design":[45],"models":[47,89],"often":[48],"struggle":[49],"cope":[51],"with":[52],"complex":[53],"evolving":[55],"strategies.":[57],"In":[58],"addition,":[59],"traditional":[60],"methods":[61],"rely":[63],"on":[64,106,157],"manual":[65],"parameter":[66],"tuning":[67],"are":[68],"inadequate":[69],"capturing":[71],"internal":[72],"information":[74],"in":[75,180],"black-box":[76],"scenarios,":[77],"making":[78],"it":[79],"difficult":[80],"maintain":[82],"efficiency":[83],"transferability":[85],"across":[86],"diverse":[87],"target":[88],"distributions.":[92],"To":[93],"address":[94],"this,":[95],"this":[96,113],"paper":[97],"proposes":[98],"Cascade":[100],"Attack":[102],"Search":[103],"approach":[104],"based":[105],"multi-objective":[107],"optimization":[108],"strategies,":[109],"named":[110],"CAAS.":[111],"Specifically,":[112],"method":[114],"constructs":[115],"comprehensive":[117],"search":[118],"space":[119],"encompassing":[120],"various":[121],"algorithms,":[123],"models,":[124,161],"their":[126],"hyperparameter":[127],"combinations.":[128],"It":[129],"employs":[130],"cascade":[132],"strategy":[133],"sequentially":[135],"apply":[136],"multiple":[137],"techniques,":[139],"aiming":[140],"improve":[142],"transfer":[143],"success":[145,168],"rates":[146],"while":[147],"reducing":[148],"costs.":[150],"Experimental":[151],"results":[152],"demonstrate":[153],"when":[155],"tested":[156],"ten":[158],"randomly":[159],"selected":[160],"CAAS":[162],"significantly":[165],"improves":[166],"rates,":[169],"effectively":[172],"controls":[173],"costs,":[175],"showcasing":[176],"its":[177],"superior":[178],"performance":[179],"the":[181],"field":[182],"of":[183],"adversarial":[184],"attacks.":[185]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-14T00:00:00"}
