{"id":"https://openalex.org/W4403864324","doi":"https://doi.org/10.1109/qrs-c63300.2024.00043","title":"Generating Adversarial Examples Using Parameter-Free Penalty Method","display_name":"Generating Adversarial Examples Using Parameter-Free Penalty Method","publication_year":2024,"publication_date":"2024-07-01","ids":{"openalex":"https://openalex.org/W4403864324","doi":"https://doi.org/10.1109/qrs-c63300.2024.00043"},"language":"en","primary_location":{"id":"doi:10.1109/qrs-c63300.2024.00043","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/qrs-c63300.2024.00043","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 24th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036104265","display_name":"Jiyuan Sun","orcid":"https://orcid.org/0009-0002-6899-9124"},"institutions":[{"id":"https://openalex.org/I135598925","display_name":"Kyushu University","ror":"https://ror.org/00p4k0j84","country_code":"JP","type":"education","lineage":["https://openalex.org/I135598925"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Jiyuan Sun","raw_affiliation_strings":["Graduate School of Information Science and Electrical Engineering, Kyushu University,Fukuoka,Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Science and Electrical Engineering, Kyushu University,Fukuoka,Japan","institution_ids":["https://openalex.org/I135598925"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027880223","display_name":"Haibo Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I199028557","display_name":"Kyushu Sangyo University","ror":"https://ror.org/01wqrpc44","country_code":"JP","type":"education","lineage":["https://openalex.org/I199028557"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Haibo Yu","raw_affiliation_strings":["Kyushu Sangyo University,Faculty of Science and Engineering,Department of Information Science,Fukuoka,Japan"],"affiliations":[{"raw_affiliation_string":"Kyushu Sangyo University,Faculty of Science and Engineering,Department of Information Science,Fukuoka,Japan","institution_ids":["https://openalex.org/I199028557"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065190767","display_name":"Jianjun Zhao","orcid":"https://orcid.org/0000-0001-8083-4352"},"institutions":[{"id":"https://openalex.org/I135598925","display_name":"Kyushu University","ror":"https://ror.org/00p4k0j84","country_code":"JP","type":"education","lineage":["https://openalex.org/I135598925"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Jianjun Zhao","raw_affiliation_strings":["Kyushu University,Faculty of Information Science and Electrical Engineering,Fukuoka,Japan"],"affiliations":[{"raw_affiliation_string":"Kyushu University,Faculty of Information Science and Electrical Engineering,Fukuoka,Japan","institution_ids":["https://openalex.org/I135598925"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5036104265"],"corresponding_institution_ids":["https://openalex.org/I135598925"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1652637,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"269","last_page":"278"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9817000031471252,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9817000031471252,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7820090055465698},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6015089750289917},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.5048282742500305},{"id":"https://openalex.org/keywords/penalty-method","display_name":"Penalty method","score":0.4924975335597992},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.35666656494140625},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24006211757659912},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.23459666967391968}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7820090055465698},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6015089750289917},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.5048282742500305},{"id":"https://openalex.org/C6180225","wikidata":"https://www.wikidata.org/wiki/Q3411771","display_name":"Penalty method","level":2,"score":0.4924975335597992},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35666656494140625},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24006211757659912},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.23459666967391968}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/qrs-c63300.2024.00043","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/qrs-c63300.2024.00043","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 24th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1945616565","https://openalex.org/W2060279450","https://openalex.org/W2108598243","https://openalex.org/W2243397390","https://openalex.org/W2763081248","https://openalex.org/W2774644650","https://openalex.org/W2963389226","https://openalex.org/W2963612069","https://openalex.org/W2963857521","https://openalex.org/W2996564870","https://openalex.org/W3043786973","https://openalex.org/W3091870967","https://openalex.org/W3118608800","https://openalex.org/W4287323182","https://openalex.org/W4288359148","https://openalex.org/W4293846201","https://openalex.org/W4320342782","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6729756640","https://openalex.org/W6739868092","https://openalex.org/W6761839128","https://openalex.org/W6765597837","https://openalex.org/W6771809012","https://openalex.org/W6780973103","https://openalex.org/W6783920880","https://openalex.org/W6784493056","https://openalex.org/W6790529436"],"related_works":["https://openalex.org/W2018662469","https://openalex.org/W2109185638","https://openalex.org/W2098882706","https://openalex.org/W1988507758","https://openalex.org/W2048756781","https://openalex.org/W2347558389","https://openalex.org/W122341662","https://openalex.org/W2106069570","https://openalex.org/W4285154570","https://openalex.org/W2945790020"],"abstract_inverted_index":{"Deep":[0],"neural":[1,20],"networks":[2,21],"are":[3],"extremely":[4],"vulnerable":[5],"to":[6,17,22,53,78,110],"adversarial":[7,10,33,122,133],"examples.":[8],"An":[9],"example":[11],"is":[12,66,75,88],"a":[13,43,58,62,104,119,126,139,160],"perturbed":[14],"input":[15],"intended":[16],"cause":[18],"deep":[19],"behave":[23],"incorrectly.":[24],"Despite":[25],"much":[26],"research":[27],"about":[28],"the":[29,40,50,54,79,91,164,169],"techniques":[30],"of":[31,90],"generating":[32],"perturbations,":[34],"most":[35,92],"optimization-based":[36],"attacks":[37],"that":[38,155],"minimize":[39],"perturbations":[41,137],"solve":[42],"constrained":[44,99,105],"nonlinear":[45],"programming":[46],"problem":[47,106],"by":[48,69,107],"adding":[49],"misclassifying":[51],"constraint":[52],"objective":[55],"function":[56],"using":[57,70],"penalty":[59,86,128],"parameter":[60],"or":[61],"Lagrange":[63],"multiplier,":[64],"which":[65,130],"usually":[67],"found":[68],"binary":[71,83],"search.":[72,84],"However,":[73],"this":[74,115],"inefficient":[76],"due":[77],"many":[80],"iterations":[81],"in":[82],"The":[85],"method":[87,157],"one":[89],"commonly":[93],"used":[94],"iterative":[95],"methods":[96],"for":[97],"solving":[98],"optimization":[100],"prob-lems.":[101],"It":[102],"solves":[103],"converting":[108],"it":[109],"an":[111],"unconstrained":[112],"one.":[113],"In":[114],"work,":[116],"we":[117],"propose":[118],"novel":[120],"white-box":[121],"attack":[123,165],"based":[124],"on":[125,145],"parameter-free":[127],"method,":[129],"could":[131],"generate":[132],"examples":[134],"with":[135],"small":[136],"at":[138],"high":[140],"success":[141,166],"rate.":[142],"Extensive":[143],"experiments":[144],"three":[146],"test":[147],"benches":[148],"have":[149],"been":[150],"conducted,":[151],"and":[152,168],"results":[153],"show":[154],"our":[156],"can":[158],"obtain":[159],"good":[161],"balance":[162],"between":[163],"rate":[167],"perturbation":[170],"size.":[171]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
