{"id":"https://openalex.org/W4387785477","doi":"https://doi.org/10.1109/ispa58351.2023.10278694","title":"Computational Color Constancy-Based Backdoor Attacks","display_name":"Computational Color Constancy-Based Backdoor Attacks","publication_year":2023,"publication_date":"2023-09-18","ids":{"openalex":"https://openalex.org/W4387785477","doi":"https://doi.org/10.1109/ispa58351.2023.10278694"},"language":"en","primary_location":{"id":"doi:10.1109/ispa58351.2023.10278694","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ispa58351.2023.10278694","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Symposium on Image and Signal Processing and Analysis (ISPA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048844211","display_name":"Donik Vr\u0161nak","orcid":"https://orcid.org/0000-0002-5866-4905"},"institutions":[{"id":"https://openalex.org/I181343428","display_name":"University of Zagreb","ror":"https://ror.org/00mv6sv71","country_code":"HR","type":"education","lineage":["https://openalex.org/I181343428"]}],"countries":["HR"],"is_corresponding":true,"raw_author_name":"Donik Vr\u0161nak","raw_affiliation_strings":["University of Zagreb,Faculty of Electrical Engineering and Computing","Faculty of Electrical Engineering and Computing, University of Zagreb"],"affiliations":[{"raw_affiliation_string":"University of Zagreb,Faculty of Electrical Engineering and Computing","institution_ids":["https://openalex.org/I181343428"]},{"raw_affiliation_string":"Faculty of Electrical Engineering and Computing, University of Zagreb","institution_ids":["https://openalex.org/I181343428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024138013","display_name":"Ivan Saboli\u0107","orcid":"https://orcid.org/0000-0002-2587-9109"},"institutions":[{"id":"https://openalex.org/I181343428","display_name":"University of Zagreb","ror":"https://ror.org/00mv6sv71","country_code":"HR","type":"education","lineage":["https://openalex.org/I181343428"]}],"countries":["HR"],"is_corresponding":false,"raw_author_name":"Ivan Saboli\u0107","raw_affiliation_strings":["University of Zagreb,Faculty of Electrical Engineering and Computing","Faculty of Electrical Engineering and Computing, University of Zagreb"],"affiliations":[{"raw_affiliation_string":"University of Zagreb,Faculty of Electrical Engineering and Computing","institution_ids":["https://openalex.org/I181343428"]},{"raw_affiliation_string":"Faculty of Electrical Engineering and Computing, University of Zagreb","institution_ids":["https://openalex.org/I181343428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080016463","display_name":"Marko Suba\u0161i\u0107","orcid":"https://orcid.org/0000-0002-4321-4557"},"institutions":[{"id":"https://openalex.org/I181343428","display_name":"University of Zagreb","ror":"https://ror.org/00mv6sv71","country_code":"HR","type":"education","lineage":["https://openalex.org/I181343428"]}],"countries":["HR"],"is_corresponding":false,"raw_author_name":"Marko Suba\u0161i\u0107","raw_affiliation_strings":["University of Zagreb,Faculty of Electrical Engineering and Computing","Faculty of Electrical Engineering and Computing, University of Zagreb"],"affiliations":[{"raw_affiliation_string":"University of Zagreb,Faculty of Electrical Engineering and Computing","institution_ids":["https://openalex.org/I181343428"]},{"raw_affiliation_string":"Faculty of Electrical Engineering and Computing, University of Zagreb","institution_ids":["https://openalex.org/I181343428"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047540566","display_name":"Sven Lon\u010dari\u0107","orcid":"https://orcid.org/0000-0002-4857-5351"},"institutions":[{"id":"https://openalex.org/I181343428","display_name":"University of Zagreb","ror":"https://ror.org/00mv6sv71","country_code":"HR","type":"education","lineage":["https://openalex.org/I181343428"]}],"countries":["HR"],"is_corresponding":false,"raw_author_name":"Sven Lon\u010dari\u0107","raw_affiliation_strings":["University of Zagreb,Faculty of Electrical Engineering and Computing","Faculty of Electrical Engineering and Computing, University of Zagreb"],"affiliations":[{"raw_affiliation_string":"University of Zagreb,Faculty of Electrical Engineering and Computing","institution_ids":["https://openalex.org/I181343428"]},{"raw_affiliation_string":"Faculty of Electrical Engineering and Computing, University of Zagreb","institution_ids":["https://openalex.org/I181343428"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5048844211"],"corresponding_institution_ids":["https://openalex.org/I181343428"],"apc_list":null,"apc_paid":null,"fwci":0.1748,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.56845372,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"33","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.9696000218391418,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9652000069618225,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9513185024261475},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.799440324306488},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6433152556419373},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.609161376953125},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5093759298324585},{"id":"https://openalex.org/keywords/multiplicative-function","display_name":"Multiplicative function","score":0.48315638303756714},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.45694172382354736},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.426201730966568},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.36811795830726624},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3373962640762329},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23855143785476685}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9513185024261475},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.799440324306488},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6433152556419373},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.609161376953125},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5093759298324585},{"id":"https://openalex.org/C42747912","wikidata":"https://www.wikidata.org/wiki/Q1048447","display_name":"Multiplicative function","level":2,"score":0.48315638303756714},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.45694172382354736},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.426201730966568},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.36811795830726624},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3373962640762329},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23855143785476685},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ispa58351.2023.10278694","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ispa58351.2023.10278694","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Symposium on Image and Signal Processing and Analysis (ISPA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1945616565","https://openalex.org/W1981276685","https://openalex.org/W2034996255","https://openalex.org/W2067713319","https://openalex.org/W2194775991","https://openalex.org/W2753783305","https://openalex.org/W2774423163","https://openalex.org/W2934843808","https://openalex.org/W2942091739","https://openalex.org/W2963263347","https://openalex.org/W2970335439","https://openalex.org/W2990270730","https://openalex.org/W3034414373","https://openalex.org/W3092873005","https://openalex.org/W3093239278","https://openalex.org/W3107337211","https://openalex.org/W3108980562","https://openalex.org/W3118608800","https://openalex.org/W3121478722","https://openalex.org/W4214564822","https://openalex.org/W4214680449","https://openalex.org/W4287998266","https://openalex.org/W4312700692","https://openalex.org/W4386083011","https://openalex.org/W6640425456","https://openalex.org/W6746897123","https://openalex.org/W6766978945","https://openalex.org/W6770897281","https://openalex.org/W6784426856","https://openalex.org/W6788876066"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W3015678314","https://openalex.org/W4281902577","https://openalex.org/W4200629851","https://openalex.org/W3009072493","https://openalex.org/W4386185023","https://openalex.org/W4317672133","https://openalex.org/W3140988292","https://openalex.org/W4386080799","https://openalex.org/W4388858813"],"abstract_inverted_index":{"Deep":[0],"neural":[1,17,51],"networks":[2,18],"(DNNs)":[3],"have":[4],"become":[5],"an":[6,36,171],"integral":[7],"part":[8],"of":[9,23,82,136,193,218,242,259],"many":[10,27],"computer":[11],"vision":[12],"tasks.":[13],"However,":[14,80],"training":[15,30],"complex":[16],"requires":[19],"a":[20,63,125,133,155,167,205],"large":[21],"amount":[22],"computational":[24],"resources.":[25],"Therefore,":[26],"users":[28],"outsource":[29],"to":[31,77,113,122,178,202,210],"third":[32],"parties.":[33],"This":[34,174],"introduces":[35],"attack":[37,220,261],"vector":[38],"for":[39,56,139,151],"backdoor":[40,64],"attacks.":[41],"These":[42],"attacks":[43,47],"are":[44,72,85,103],"described":[45],"as":[46,54],"in":[48,68,116,124,159,252],"which":[49,105],"the":[50,69,78,88,92,98,117,140,147,180,186,216,239,257],"network":[52],"behaves":[53],"expected":[55],"benign":[57],"inputs":[58],"but":[59],"acts":[60],"maliciously":[61],"when":[62,208],"trigger":[65,93,137,165,187],"is":[66,94,109,144,188],"present":[67,132],"input.":[70,79],"Triggers":[71],"small,":[73],"preferably":[74],"stealthy":[75],"additions":[76],"most":[81],"these":[83],"triggers":[84,102],"based":[86,145,189],"on":[87,146,190,226,245],"additive":[89,172,212],"model,":[90],"i.e.,":[91],"simply":[95],"added":[96],"onto":[97],"image.":[99],"Furthermore,":[100,235],"optimized":[101],"artificial,":[104],"means":[106],"that":[107,238],"it":[108,176,197],"difficult":[110],"or":[111],"impossible":[112],"reproduce":[114],"them":[115,120],"real-world,":[118],"making":[119],"impractical":[121],"use":[123],"real-world":[126,191,253],"setting.":[127],"In":[128],"this":[129],"work,":[130],"we":[131,236],"novel":[134],"way":[135],"injection":[138,181],"classification":[141],"problem.":[142],"It":[143],"von":[148],"Kries":[149],"model":[150],"image":[152,161],"color":[153],"correction,":[154],"frequently":[156,228],"used":[157,229],"component":[158],"all":[160],"processing":[162],"pipelines.":[163],"Our":[164],"uses":[166],"multiplicative":[168],"rather":[169],"than":[170],"model.":[173],"makes":[175],"harder":[177,201],"detect":[179],"by":[182,204],"defensive":[183],"methods.":[184],"Second,":[185],"phenomena":[192],"changing":[194],"illumination.":[195],"Finally,":[196],"can":[198,249],"be":[199,250],"made":[200],"spot":[203],"human":[206],"observer,":[207],"compared":[209],"some":[211],"triggers.":[213],"We":[214],"test":[215],"performance":[217],"our":[219,260],"strategy":[221],"against":[222],"various":[223],"defense":[224],"methods":[225],"several":[227],"datasets,":[230],"and":[231],"achieve":[232],"excellent":[233],"results.":[234],"show":[237],"malicious":[240],"behavior":[241],"models":[243],"trained":[244],"artificially":[246],"colored":[247],"images":[248],"activated":[251],"scenarios,":[254],"further":[255],"increasing":[256],"usefulness":[258],"strategy.":[262]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
