{"id":"https://openalex.org/W7125930986","doi":"https://doi.org/10.1109/smc58881.2025.11342475","title":"Boundary Box-Guided Targeted Adversarial Attacks with Semantic Perturbation","display_name":"Boundary Box-Guided Targeted Adversarial Attacks with Semantic Perturbation","publication_year":2025,"publication_date":"2025-10-05","ids":{"openalex":"https://openalex.org/W7125930986","doi":"https://doi.org/10.1109/smc58881.2025.11342475"},"language":null,"primary_location":{"id":"doi:10.1109/smc58881.2025.11342475","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11342475","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121408908","display_name":"Hongtian Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongtian Zhao","raw_affiliation_strings":["Xinjiang University,Urumqi,China"],"affiliations":[{"raw_affiliation_string":"Xinjiang University,Urumqi,China","institution_ids":["https://openalex.org/I96908189"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027515230","display_name":"Wenzhuo Shi","orcid":"https://orcid.org/0000-0003-2311-4927"},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenzhuo Shi","raw_affiliation_strings":["Xinjiang University,Urumqi,China"],"affiliations":[{"raw_affiliation_string":"Xinjiang University,Urumqi,China","institution_ids":["https://openalex.org/I96908189"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124076667","display_name":"Chang Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chang Liu","raw_affiliation_strings":["Tsinghua University,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,Beijing,China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051449178","display_name":"Yiquan Wang","orcid":"https://orcid.org/0000-0003-1417-5752"},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiquan Wang","raw_affiliation_strings":["Xinjiang University,Urumqi,China"],"affiliations":[{"raw_affiliation_string":"Xinjiang University,Urumqi,China","institution_ids":["https://openalex.org/I96908189"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5121408908"],"corresponding_institution_ids":["https://openalex.org/I96908189"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.87734677,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1604","last_page":"1609"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.003100000089034438,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11105","display_name":"Advanced Image Processing Techniques","score":0.0006000000284984708,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7513999938964844},{"id":"https://openalex.org/keywords/boundary","display_name":"Boundary (topology)","score":0.4555000066757202},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.42410001158714294},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.3889999985694885},{"id":"https://openalex.org/keywords/perturbation","display_name":"Perturbation (astronomy)","score":0.35899999737739563},{"id":"https://openalex.org/keywords/optimization-problem","display_name":"Optimization problem","score":0.3483000099658966},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.3424000144004822},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.33309999108314514}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7513999938964844},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7138000130653381},{"id":"https://openalex.org/C62354387","wikidata":"https://www.wikidata.org/wiki/Q875399","display_name":"Boundary (topology)","level":2,"score":0.4555000066757202},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43059998750686646},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.42410001158714294},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.3889999985694885},{"id":"https://openalex.org/C177918212","wikidata":"https://www.wikidata.org/wiki/Q803623","display_name":"Perturbation (astronomy)","level":2,"score":0.35899999737739563},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.3483000099658966},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3424000144004822},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3379000127315521},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33660000562667847},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.33309999108314514},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.32589998841285706},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.3190999925136566},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3154999911785126},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.3100999891757965},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.30709999799728394},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.29269999265670776},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2745000123977661},{"id":"https://openalex.org/C50637493","wikidata":"https://www.wikidata.org/wiki/Q1136781","display_name":"Morphing","level":2,"score":0.26440000534057617},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.26350000500679016},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.26260000467300415},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.26249998807907104},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.2597000002861023},{"id":"https://openalex.org/C2776459999","wikidata":"https://www.wikidata.org/wiki/Q2119376","display_name":"Fidelity","level":2,"score":0.25940001010894775},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.2565000057220459}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc58881.2025.11342475","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11342475","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2183341477","https://openalex.org/W2194775991","https://openalex.org/W2774644650","https://openalex.org/W2945472816","https://openalex.org/W2962847335","https://openalex.org/W2963542245","https://openalex.org/W2963855547","https://openalex.org/W2969542116","https://openalex.org/W3034643863","https://openalex.org/W3035569111","https://openalex.org/W3035751626","https://openalex.org/W3164563754","https://openalex.org/W3183199078","https://openalex.org/W4386057730","https://openalex.org/W4393099525"],"related_works":[],"abstract_inverted_index":{"Targeted":[0],"adversarial":[1,79],"attacks":[2,125],"in":[3,11,34],"black-box":[4,124],"settings":[5],"are":[6],"pivotal":[7],"for":[8,41,105],"uncovering":[9],"vulnerabilities":[10],"neural":[12],"networks":[13],"and":[14,37,126],"guiding":[15],"the":[16,27,39,57,88,91,98,113,119],"development":[17],"of":[18,122],"robust":[19],"defenses.":[20],"However,":[21],"conventional":[22],"attack":[23,67],"methods":[24],"typically":[25],"perturb":[26],"primary":[28],"content,":[29],"leading":[30],"to":[31,56,76,135],"a":[32,50],"degradation":[33],"image":[35,58],"quality":[36],"highlighting":[38],"need":[40],"more":[42],"reasonable":[43],"optimization":[44,104],"strategies.":[45],"In":[46],"contrast,":[47],"we":[48],"propose":[49],"novel":[51],"algorithm":[52],"that":[53,112],"restricts":[54],"perturbations":[55,85],"boundary":[59,92],"regions,":[60],"thereby":[61],"preserving":[62],"content":[63],"fidelity":[64],"while":[65],"enhancing":[66],"effectiveness.":[68],"Our":[69],"approach":[70],"employs":[71],"an":[72],"encoder\u2013decoder":[73],"generative":[74],"network":[75],"craft":[77],"targeted":[78,107,123],"examples":[80],"guided":[81],"by":[82],"optimized":[83,96],"semantic":[84],"derived":[86],"from":[87],"boundaries.":[89],"Moreover,":[90],"signal":[93],"is":[94],"jointly":[95],"with":[97],"model":[99],"parameters,":[100],"enabling":[101],"efficient,":[102],"amortized":[103],"multi-class":[106],"attacks.":[108],"Extensive":[109],"experiments":[110],"demonstrate":[111],"proposed":[114],"boundary-guided":[115],"method":[116],"significantly":[117],"improves":[118],"success":[120],"rates":[121],"can":[127],"be":[128],"seamlessly":[129],"integrated":[130],"into":[131],"existing":[132],"noise-injection":[133],"techniques":[134],"enhance":[136],"overall":[137],"performance.":[138]},"counts_by_year":[],"updated_date":"2026-02-23T20:09:44.859080","created_date":"2026-01-29T00:00:00"}
