{"id":"https://openalex.org/W4380303574","doi":"https://doi.org/10.1109/jsyst.2023.3281079","title":"The Impact of Adversarial Attacks on Interpretable Semantic Segmentation in Cyber\u2013Physical Systems","display_name":"The Impact of Adversarial Attacks on Interpretable Semantic Segmentation in Cyber\u2013Physical Systems","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4380303574","doi":"https://doi.org/10.1109/jsyst.2023.3281079"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2023.3281079","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2023.3281079","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072442200","display_name":"Rokas Gipi\u0161kis","orcid":"https://orcid.org/0000-0001-5166-0920"},"institutions":[{"id":"https://openalex.org/I173212132","display_name":"Vilnius University","ror":"https://ror.org/03nadee84","country_code":"LT","type":"education","lineage":["https://openalex.org/I173212132"]}],"countries":["LT"],"is_corresponding":true,"raw_author_name":"Rokas Gipi\u0161kis","raw_affiliation_strings":["Institute of Data Science and Digital Technologies, Vilnius University, Vilnius, Lithuania"],"affiliations":[{"raw_affiliation_string":"Institute of Data Science and Digital Technologies, Vilnius University, Vilnius, Lithuania","institution_ids":["https://openalex.org/I173212132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057470411","display_name":"Diletta Chiaro","orcid":"https://orcid.org/0000-0001-5145-4465"},"institutions":[{"id":"https://openalex.org/I71267560","display_name":"University of Naples Federico II","ror":"https://ror.org/05290cv24","country_code":"IT","type":"education","lineage":["https://openalex.org/I71267560"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Diletta Chiaro","raw_affiliation_strings":["Department of Mathematics and Applications &#x201C;R. Caccioppoli&#x201D;, University of Naples Federico II, Napoli, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Applications &#x201C;R. Caccioppoli&#x201D;, University of Naples Federico II, Napoli, Italy","institution_ids":["https://openalex.org/I71267560"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059409186","display_name":"Marco Preziosi","orcid":"https://orcid.org/0000-0003-1166-442X"},"institutions":[{"id":"https://openalex.org/I71267560","display_name":"University of Naples Federico II","ror":"https://ror.org/05290cv24","country_code":"IT","type":"education","lineage":["https://openalex.org/I71267560"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Marco Preziosi","raw_affiliation_strings":["Department of Mathematics and Applications &#x201C;R. Caccioppoli&#x201D;, University of Naples Federico II, Napoli, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Applications &#x201C;R. Caccioppoli&#x201D;, University of Naples Federico II, Napoli, Italy","institution_ids":["https://openalex.org/I71267560"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018712726","display_name":"Edoardo Prezioso","orcid":"https://orcid.org/0000-0002-0401-8422"},"institutions":[{"id":"https://openalex.org/I71267560","display_name":"University of Naples Federico II","ror":"https://ror.org/05290cv24","country_code":"IT","type":"education","lineage":["https://openalex.org/I71267560"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Edoardo Prezioso","raw_affiliation_strings":["Department of Mathematics and Applications &#x201C;R. Caccioppoli&#x201D;, University of Naples Federico II, Napoli, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Applications &#x201C;R. Caccioppoli&#x201D;, University of Naples Federico II, Napoli, Italy","institution_ids":["https://openalex.org/I71267560"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016445191","display_name":"Francesco Piccialli","orcid":"https://orcid.org/0000-0002-5179-2496"},"institutions":[{"id":"https://openalex.org/I71267560","display_name":"University of Naples Federico II","ror":"https://ror.org/05290cv24","country_code":"IT","type":"education","lineage":["https://openalex.org/I71267560"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Francesco Piccialli","raw_affiliation_strings":["Department of Mathematics and Applications &#x201C;R. Caccioppoli&#x201D;, University of Naples Federico II, Napoli, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Applications &#x201C;R. Caccioppoli&#x201D;, University of Naples Federico II, Napoli, Italy","institution_ids":["https://openalex.org/I71267560"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5072442200"],"corresponding_institution_ids":["https://openalex.org/I173212132"],"apc_list":null,"apc_paid":null,"fwci":2.2694,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.90284338,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9799000024795532,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.7909297347068787},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7793213129043579},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7748964428901672},{"id":"https://openalex.org/keywords/segmentation","display_name":"Segmentation","score":0.7025772929191589},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6540961265563965},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5714676976203918},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5246363282203674},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.488061785697937},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4839335083961487},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.47427043318748474},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.4665251672267914},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.46359580755233765},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.42677533626556396},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41914474964141846},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3350123167037964}],"concepts":[{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.7909297347068787},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7793213129043579},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7748964428901672},{"id":"https://openalex.org/C89600930","wikidata":"https://www.wikidata.org/wiki/Q1423946","display_name":"Segmentation","level":2,"score":0.7025772929191589},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6540961265563965},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5714676976203918},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5246363282203674},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.488061785697937},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4839335083961487},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.47427043318748474},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.4665251672267914},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.46359580755233765},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.42677533626556396},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41914474964141846},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3350123167037964},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2023.3281079","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2023.3281079","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W1673923490","https://openalex.org/W1901129140","https://openalex.org/W1945616565","https://openalex.org/W1977555035","https://openalex.org/W2108598243","https://openalex.org/W2340897893","https://openalex.org/W2604505099","https://openalex.org/W2913039310","https://openalex.org/W2951306478","https://openalex.org/W2962700793","https://openalex.org/W2962843949","https://openalex.org/W2962851944","https://openalex.org/W2962858109","https://openalex.org/W2963491874","https://openalex.org/W2964920648","https://openalex.org/W3037158619","https://openalex.org/W3040838366","https://openalex.org/W3096790059","https://openalex.org/W3098476760","https://openalex.org/W3104227430","https://openalex.org/W3119687955","https://openalex.org/W3120795858","https://openalex.org/W3127943761","https://openalex.org/W3164841614","https://openalex.org/W3204162860","https://openalex.org/W3217748719","https://openalex.org/W4210725851","https://openalex.org/W4226179997","https://openalex.org/W4231071255","https://openalex.org/W4285019560","https://openalex.org/W4293861706","https://openalex.org/W4312773851","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6685133223","https://openalex.org/W6734629475","https://openalex.org/W6739575509","https://openalex.org/W6756943956","https://openalex.org/W6758853676","https://openalex.org/W6764249507","https://openalex.org/W6766060138"],"related_works":["https://openalex.org/W2905433371","https://openalex.org/W4390569940","https://openalex.org/W2888392564","https://openalex.org/W4361193272","https://openalex.org/W4320018150","https://openalex.org/W2040808657","https://openalex.org/W2918664383","https://openalex.org/W4320855730","https://openalex.org/W106056076","https://openalex.org/W2135200719"],"abstract_inverted_index":{"The":[0],"widespread":[1],"adoption":[2],"of":[3,72,95,117,155,174],"deep":[4],"learning":[5],"(DL)":[6],"models":[7],"raises":[8],"concerns":[9],"about":[10],"their":[11,52,63],"trustworthiness":[12],"and":[13,54,65,75,137],"reliability.":[14],"Adversarial":[15],"attacks":[16,19,74,118,176],"are":[17,123],"cyber-related":[18],"that":[20,59],"target":[21],"the":[22,70,85,92,128,142,153,160,165,172],"DL":[23],"network's":[24],"prediction":[25],"by":[26],"adding":[27],"imperceptible":[28],"perturbations":[29],"to":[30,89,91,105,151,159,164,180],"its":[31,139],"input.":[32],"Their":[33],"deployment":[34],"against":[35],"critical":[36],"artificial-intelligence-based":[37],"systems,":[38],"such":[39],"as":[40],"industrial":[41],"cyber\u2013physical":[42,111],"systems":[43],"(ICPSs),":[44],"can":[45,56],"result":[46],"in":[47,84,87],"substantial":[48],"damage.":[49],"Research":[50],"on":[51,108,119,133,141,177],"scope":[53],"limitations":[55],"provide":[57],"information":[58],"would":[60],"help":[61],"with":[62,162],"detection":[64],"prevention.":[66],"In":[67],"this":[68],"article,":[69],"interconnection":[71],"adversarial":[73,175],"interpretable":[76],"semantic":[77,106,120,181],"segmentation":[78,107,121,135],"is":[79],"investigated":[80],"for":[81],"potential":[82],"applications":[83],"ICPS":[86],"order":[88],"contribute":[90],"safe":[93],"use":[94],"future":[96],"intelligent":[97],"systems.":[98],"We":[99,146],"first":[100],"explore":[101],"gradient-based":[102],"interpretability":[103],"extensions":[104],"two":[109,115],"industry-related":[110],"system":[112],"datasets.":[113],"Then,":[114],"types":[116],"networks":[122],"discussed.":[124],"First,":[125],"we":[126,170],"apply":[127],"dense":[129],"adversary":[130],"generation":[131],"attack":[132],"different":[134],"outputs":[136],"evaluate":[138],"influence":[140],"corresponding":[143],"saliency":[144,157,178],"maps.":[145],"then":[147],"introduce":[148],"a":[149],"way":[150],"visualize":[152],"similarity":[154],"attacked":[156],"maps":[158,179],"original":[161],"respect":[163],"targeted":[166],"attack's":[167],"direction.":[168],"Finally,":[169],"extend":[171],"application":[173],"segmentation.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
