{"id":"https://openalex.org/W4412081664","doi":"https://doi.org/10.1109/jiot.2025.3586440","title":"BadSTR: Backdoor Attack on Scene Text Recognition in IoT","display_name":"BadSTR: Backdoor Attack on Scene Text Recognition in IoT","publication_year":2025,"publication_date":"2025-07-07","ids":{"openalex":"https://openalex.org/W4412081664","doi":"https://doi.org/10.1109/jiot.2025.3586440"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3586440","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3586440","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045262050","display_name":"Qiuhua Wang","orcid":"https://orcid.org/0000-0002-0017-9026"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qiuhua Wang","raw_affiliation_strings":["School of Cyberspace, and the Data Security Governance Zhejiang Engineering Research Center, Hangzhou Dianzi University, Hangzhou, China","School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace, and the Data Security Governance Zhejiang Engineering Research Center, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]},{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041184605","display_name":"Yifan Hu","orcid":"https://orcid.org/0000-0003-2620-352X"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Hu","raw_affiliation_strings":["School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059919326","display_name":"Xiyuan Jia","orcid":"https://orcid.org/0009-0006-9419-6893"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiyuan Jia","raw_affiliation_strings":["School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082195875","display_name":"Guohua Wu","orcid":"https://orcid.org/0000-0001-5089-4354"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guohua Wu","raw_affiliation_strings":["School of Cyberspace, and the Data Security Governance Zhejiang Engineering Research Center, Hangzhou Dianzi University, Hangzhou, China","School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace, and the Data Security Governance Zhejiang Engineering Research Center, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]},{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100614965","display_name":"Yizhi Ren","orcid":"https://orcid.org/0000-0002-1421-9164"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yizhi Ren","raw_affiliation_strings":["School of Cyberspace, and the Data Security Governance Zhejiang Engineering Research Center, Hangzhou Dianzi University, Hangzhou, China","School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace, and the Data Security Governance Zhejiang Engineering Research Center, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]},{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031848612","display_name":"Gaoning Pan","orcid":null},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gaoning Pan","raw_affiliation_strings":["School of Cyberspace, and the Data Security Governance Zhejiang Engineering Research Center, Hangzhou Dianzi University, Hangzhou, China","School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace, and the Data Security Governance Zhejiang Engineering Research Center, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]},{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073957898","display_name":"Yanyu Cheng","orcid":"https://orcid.org/0000-0001-9104-9376"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanyu Cheng","raw_affiliation_strings":["School of Cyberspace, and the Data Security Governance Zhejiang Engineering Research Center, Hangzhou Dianzi University, Hangzhou, China","School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace, and the Data Security Governance Zhejiang Engineering Research Center, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]},{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5045262050"],"corresponding_institution_ids":["https://openalex.org/I50760025"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27266672,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":"18","first_page":"38526","last_page":"38539"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9587000012397766,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9587000012397766,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9587000012397766,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9380000233650208,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9703457355499268},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8158794641494751},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5030714869499207},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4850734770298004},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.42271292209625244},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3771819472312927},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.347960889339447}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9703457355499268},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8158794641494751},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5030714869499207},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4850734770298004},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.42271292209625244},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3771819472312927},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.347960889339447}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3586440","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3586440","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W2127141656","https://openalex.org/W2128409098","https://openalex.org/W2194187530","https://openalex.org/W2294053032","https://openalex.org/W2343052201","https://openalex.org/W2810983211","https://openalex.org/W2942091739","https://openalex.org/W2962829835","https://openalex.org/W2963517393","https://openalex.org/W3012113073","https://openalex.org/W3034579202","https://openalex.org/W3035449864","https://openalex.org/W3042368254","https://openalex.org/W3083321694","https://openalex.org/W3107337211","https://openalex.org/W3114838227","https://openalex.org/W3121099749","https://openalex.org/W3181186176","https://openalex.org/W3204479434","https://openalex.org/W3212709629","https://openalex.org/W4214537185","https://openalex.org/W4214680449","https://openalex.org/W4225562651","https://openalex.org/W4312233756","https://openalex.org/W4312280786","https://openalex.org/W4312569687","https://openalex.org/W4320736757","https://openalex.org/W4372260097","https://openalex.org/W4405784827"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799","https://openalex.org/W3140988292","https://openalex.org/W4317672133","https://openalex.org/W4401407399"],"abstract_inverted_index":{"Recent":[0],"researches":[1],"have":[2],"shown":[3],"that":[4,103,166,180],"non-sequential":[5],"tasks":[6],"based":[7],"on":[8,74,90,118,175],"deep":[9],"neural":[10],"networks":[11],"(DNN),":[12],"such":[13,47],"as":[14,48,142,171],"image":[15],"classification":[16],"and":[17,52,61,144],"object":[18],"detection,":[19],"are":[20,70],"vulnerable":[21],"to":[22,26,86,134],"backdoor":[23,76,88,152,163],"attacks,":[24],"leading":[25],"incorrect":[27],"model":[28],"predictions.":[29],"As":[30],"a":[31,95,125,161],"crucial":[32],"task":[33],"in":[34,44,138],"computer":[35],"vision,":[36],"Scene":[37],"Text":[38],"Recognition":[39],"(STR)":[40],"is":[41,66],"widely":[42],"used":[43],"IoT":[45],"fields":[46],"intelligent":[49,53],"transportation":[50],"systems":[51],"surveillance.":[54],"Given":[55],"its":[56],"importance,":[57],"ensuring":[58],"the":[59,83,128,135,151],"security":[60],"accuracy":[62],"of":[63,115,186],"STR":[64,75,91,104,139],"models":[65,92,105,140],"critical.":[67],"However,":[68,121],"there":[69],"currently":[71],"no":[72],"studies":[73],"attacks.":[77],"In":[78],"this":[79],"paper,":[80],"we":[81,122,157],"make":[82],"first":[84],"attempt":[85],"validate":[87],"threats":[89],"by":[93],"using":[94],"Patch-Based":[96,129],"Attack":[97],"method.":[98],"Our":[99],"experimental":[100],"results":[101],"confirm":[102],"can":[106],"be":[107],"successfully":[108],"compromised":[109],"with":[110,193],"attack":[111,130,164],"success":[112],"rate":[113],"(ASR)":[114],"over":[116,187],"80%":[117],"most":[119,190],"datasets.":[120],"also":[123],"reveal":[124],"critical":[126],"flaw:":[127],"lacks":[131],"robustness":[132],"due":[133],"specific":[136],"preprocessing":[137],"(such":[141],"resizing":[143],"TPS":[145],"rectification),":[146],"which":[147],"distort":[148],"or":[149],"eliminate":[150],"triggers.":[153,172],"To":[154],"address":[155],"this,":[156],"further":[158],"propose":[159],"BadSTR,":[160],"novel":[162],"method":[165],"uses":[167],"semantic":[168],"text":[169],"sequences":[170],"Extensive":[173],"experiments":[174],"eight":[176],"benchmark":[177],"datasets":[178],"show":[179],"our":[181],"proposed":[182],"BadSTR":[183],"achieves":[184],"ASR":[185],"90%":[188],"for":[189],"model-dataset":[191],"combinations":[192],"significantly":[194],"improved":[195],"robustness.":[196]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
