{"id":"https://openalex.org/W3041689490","doi":"https://doi.org/10.1109/jiot.2020.3008232","title":"Toward Invisible Adversarial Examples Against DNN-Based Privacy Leakage for Internet of Things","display_name":"Toward Invisible Adversarial Examples Against DNN-Based Privacy Leakage for Internet of Things","publication_year":2020,"publication_date":"2020-07-09","ids":{"openalex":"https://openalex.org/W3041689490","doi":"https://doi.org/10.1109/jiot.2020.3008232","mag":"3041689490"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2020.3008232","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.3008232","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090730320","display_name":"Xuyang Ding","orcid":"https://orcid.org/0000-0002-8785-9015"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuyang Ding","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100328881","display_name":"Shuai Zhang","orcid":"https://orcid.org/0000-0002-4821-6404"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuai Zhang","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085556383","display_name":"Mengkai Song","orcid":"https://orcid.org/0000-0002-7907-3469"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengkai Song","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065552991","display_name":"Xiaocong Ding","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaocong Ding","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032223567","display_name":"Fagen Li","orcid":"https://orcid.org/0000-0001-6289-1265"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fagen Li","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5090730320"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":2.057,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.89530388,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"8","issue":"2","first_page":"802","last_page":"812"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9656000137329102,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8694453835487366},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8018428087234497},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5111363530158997},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5045250654220581},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4913100302219391},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4431261718273163},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.4211939871311188},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.41711729764938354},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4146909713745117},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4072127640247345},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3608175814151764},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3336940407752991},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.320193886756897},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08594968914985657}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8694453835487366},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8018428087234497},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5111363530158997},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5045250654220581},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4913100302219391},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4431261718273163},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.4211939871311188},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.41711729764938354},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4146909713745117},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4072127640247345},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3608175814151764},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3336940407752991},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.320193886756897},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08594968914985657}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2020.3008232","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.3008232","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7699999809265137,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W1536680647","https://openalex.org/W1673923490","https://openalex.org/W1935207225","https://openalex.org/W1945616565","https://openalex.org/W2125908420","https://openalex.org/W2151298633","https://openalex.org/W2163605009","https://openalex.org/W2180612164","https://openalex.org/W2183341477","https://openalex.org/W2243397390","https://openalex.org/W2282821441","https://openalex.org/W2295107390","https://openalex.org/W2412393473","https://openalex.org/W2486441166","https://openalex.org/W2535873859","https://openalex.org/W2543927648","https://openalex.org/W2570685808","https://openalex.org/W2604505099","https://openalex.org/W2607219512","https://openalex.org/W2741933435","https://openalex.org/W2751902866","https://openalex.org/W2765424254","https://openalex.org/W2774644650","https://openalex.org/W2911377781","https://openalex.org/W2950800384","https://openalex.org/W2963118571","https://openalex.org/W2963149332","https://openalex.org/W2963207607","https://openalex.org/W2963383024","https://openalex.org/W2963389226","https://openalex.org/W2963542245","https://openalex.org/W2963857521","https://openalex.org/W2963917086","https://openalex.org/W2964082701","https://openalex.org/W2964153729","https://openalex.org/W2980248764","https://openalex.org/W2995245581","https://openalex.org/W3009195050","https://openalex.org/W3102720581","https://openalex.org/W3103557498","https://openalex.org/W4287771714","https://openalex.org/W4288359148","https://openalex.org/W4300824008","https://openalex.org/W6637162671","https://openalex.org/W6684191040","https://openalex.org/W6714138976","https://openalex.org/W6715144786","https://openalex.org/W6719080892","https://openalex.org/W6722479552","https://openalex.org/W6728896693","https://openalex.org/W6729756640","https://openalex.org/W6731927902","https://openalex.org/W6761839128","https://openalex.org/W6771468614"],"related_works":["https://openalex.org/W2950183588","https://openalex.org/W3080754722","https://openalex.org/W4383221314","https://openalex.org/W3093978547","https://openalex.org/W2953536436","https://openalex.org/W3203790781","https://openalex.org/W2997056298","https://openalex.org/W4313346231","https://openalex.org/W2738001131","https://openalex.org/W4285785480"],"abstract_inverted_index":{"Deep":[0],"neural":[1,206],"networks":[2],"(DNNs)":[3],"can":[4,57],"be":[5,58,89,118],"utilized":[6],"maliciously":[7],"for":[8,52,209],"compromising":[9],"the":[10,18,27,49,62,71,79,84,104,110,150,159,164,171,179,200,205,210,219],"privacy":[11,64,151],"stored":[12,20,102],"in":[13,21,48,66,103,148,154,163,218],"electronic":[14],"devices,":[15],"e.g.,":[16],"identifying":[17],"images":[19],"a":[22,97,107,114,134,215],"mobile":[23,67],"phone":[24],"connected":[25],"to":[26,40,60,88,92,117,143,170,183],"Internet":[28],"of":[29,82,100,113,137,152,167,173,187],"Things":[30],"(IoT).":[31],"However,":[32],"recent":[33],"studies":[34],"demonstrated":[35],"that":[36,199],"DNNs":[37],"are":[38,44],"vulnerable":[39],"adversarial":[41,74,85,145,188],"examples,":[42],"which":[43],"artificially":[45],"designed":[46],"perturbations":[47],"original":[50,93],"samples":[51],"misleading":[53],"DNNs.":[54],"Adversarial":[55],"examples":[56,86,146,189],"used":[59],"protect":[61],"DNN-based":[63],"leakage":[65],"phones":[68],"by":[69],"replacing":[70],"photos":[72,101,153],"with":[73,214],"examples.":[75],"To":[76,95],"avoid":[77],"affecting":[78],"normal":[80],"use":[81],"photos,":[83],"need":[87],"highly":[90],"similar":[91],"images.":[94],"handle":[96],"large":[98],"number":[99],"devices":[105],"at":[106],"proper":[108],"time,":[109],"time":[111,226],"efficiency":[112],"method":[115],"needs":[116],"high":[119,192],"enough.":[120],"Previous":[121],"methods":[122,202],"cannot":[123],"do":[124],"well":[125],"on":[126],"both":[127],"sides.":[128],"In":[129],"this":[130],"article,":[131],"we":[132,177],"propose":[133],"broad":[135],"class":[136],"selective":[138],"gradient":[139],"sign":[140],"iterative":[141,165],"algorithms":[142],"make":[144],"useful":[147],"protecting":[149],"IoT":[155],"devices.":[156],"By":[157],"neglecting":[158],"unimportant":[160],"image":[161,185,211],"pixels":[162],"process":[166],"attacks":[168],"according":[169],"sort":[172],"first-order":[174],"partial":[175],"derivative,":[176],"control":[178],"optimization":[180],"direction":[181],"meticulously":[182],"reduce":[184],"distortions":[186],"without":[190],"leveraging":[191],"time-consuming":[193],"tricks.":[194],"Extensive":[195],"experimental":[196],"results":[197],"show":[198],"proposed":[201],"successfully":[203],"fool":[204],"network":[207],"classifiers":[208],"classification":[212],"task":[213],"small":[216],"change":[217],"visual":[220],"effects":[221],"and":[222],"consume":[223],"little":[224],"calculating":[225],"simultaneously.":[227]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
