{"id":"https://openalex.org/W3133050722","doi":"https://doi.org/10.1109/tcsii.2021.3061154","title":"Anti-Interpolation: An Attack Facilitator Hiding Adversaries Into Images","display_name":"Anti-Interpolation: An Attack Facilitator Hiding Adversaries Into Images","publication_year":2021,"publication_date":"2021-02-22","ids":{"openalex":"https://openalex.org/W3133050722","doi":"https://doi.org/10.1109/tcsii.2021.3061154","mag":"3133050722"},"language":"en","primary_location":{"id":"doi:10.1109/tcsii.2021.3061154","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsii.2021.3061154","pdf_url":null,"source":{"id":"https://openalex.org/S93916849","display_name":"IEEE Transactions on Circuits & Systems II Express Briefs","issn_l":"1549-7747","issn":["1549-7747","1558-3791"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems II: Express Briefs","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101758654","display_name":"Jinyin Chen","orcid":"https://orcid.org/0000-0002-7153-2755"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jinyin Chen","raw_affiliation_strings":["Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021568693","display_name":"Hui Xiong","orcid":"https://orcid.org/0000-0001-6556-2299"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Xiong","raw_affiliation_strings":["College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Zhejiang University of Technology, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072212265","display_name":"Haibin Zheng","orcid":"https://orcid.org/0000-0002-8997-5343"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haibin Zheng","raw_affiliation_strings":["College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Zhejiang University of Technology, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017748295","display_name":"Zhaoyan Ming","orcid":"https://orcid.org/0000-0002-6766-4579"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaoyan Ming","raw_affiliation_strings":["Institute of Computing Innovation, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Innovation, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100739893","display_name":"Yi Liu","orcid":"https://orcid.org/0000-0002-4066-689X"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Liu","raw_affiliation_strings":["Institute of Process Equipment and Control Engineering, Zhejiang University of Technology, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Institute of Process Equipment and Control Engineering, Zhejiang University of Technology, Hangzhou, China","institution_ids":["https://openalex.org/I55712492"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101758654"],"corresponding_institution_ids":["https://openalex.org/I55712492"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.02900275,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"68","issue":"7","first_page":"2670","last_page":"2674"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.972100019454956,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9480000138282776,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.6585429310798645},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6084843277931213},{"id":"https://openalex.org/keywords/interpolation","display_name":"Interpolation (computer graphics)","score":0.5407741665840149},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5211731791496277},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.46959248185157776},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3913995921611786},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.28189435601234436},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.20955514907836914},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.16273924708366394}],"concepts":[{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.6585429310798645},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6084843277931213},{"id":"https://openalex.org/C137800194","wikidata":"https://www.wikidata.org/wiki/Q11713455","display_name":"Interpolation (computer graphics)","level":3,"score":0.5407741665840149},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5211731791496277},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.46959248185157776},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3913995921611786},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28189435601234436},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.20955514907836914},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.16273924708366394}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcsii.2021.3061154","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsii.2021.3061154","pdf_url":null,"source":{"id":"https://openalex.org/S93916849","display_name":"IEEE Transactions on Circuits & Systems II Express Briefs","issn_l":"1549-7747","issn":["1549-7747","1558-3791"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems II: Express Briefs","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2452714580","display_name":null,"funder_award_id":"62072406","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4947568728","display_name":null,"funder_award_id":"61873241","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G731995413","display_name":null,"funder_award_id":"LY19F020025","funder_id":"https://openalex.org/F4320338464","funder_display_name":"Natural Science Foundation of Zhejiang Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320338464","display_name":"Natural Science Foundation of Zhejiang Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1673923490","https://openalex.org/W1945616565","https://openalex.org/W2108598243","https://openalex.org/W2155893237","https://openalex.org/W2163605009","https://openalex.org/W2194775991","https://openalex.org/W2243397390","https://openalex.org/W2402144811","https://openalex.org/W2746600820","https://openalex.org/W2768346313","https://openalex.org/W2774644650","https://openalex.org/W2902543210","https://openalex.org/W2919115771","https://openalex.org/W2923415235","https://openalex.org/W2940483533","https://openalex.org/W2953384591","https://openalex.org/W2963207607","https://openalex.org/W2963249138","https://openalex.org/W2963389226","https://openalex.org/W2963612069","https://openalex.org/W2963857521","https://openalex.org/W2964082701","https://openalex.org/W2964153729","https://openalex.org/W2964253222","https://openalex.org/W2965628707","https://openalex.org/W2970971581","https://openalex.org/W2981522341","https://openalex.org/W2983219069","https://openalex.org/W3023621413","https://openalex.org/W3045729505","https://openalex.org/W3046663063","https://openalex.org/W3106412272","https://openalex.org/W4293846201","https://openalex.org/W4295312788","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6684191040","https://openalex.org/W6713134421","https://openalex.org/W6729756640","https://openalex.org/W6739868092","https://openalex.org/W6766313860","https://openalex.org/W6766978945"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2367652182","https://openalex.org/W1915958221","https://openalex.org/W2037074416","https://openalex.org/W2174180450","https://openalex.org/W1519931592","https://openalex.org/W2101207231","https://openalex.org/W2741873457","https://openalex.org/W3105849702","https://openalex.org/W2142192217"],"abstract_inverted_index":{"Deep":[0],"learning":[1],"models":[2,135],"show":[3],"the":[4,20,28,31,36,39,44,62,67,96,105,109,116],"vulnerability":[5],"to":[6,13,77],"adversarial":[7,79,118],"examples,":[8],"which":[9,102],"can":[10,103,121],"be":[11],"attacked":[12],"make":[14],"incorrect":[15],"predictions.":[16],"As":[17],"one":[18],"of":[19,30,99,132],"key":[21],"image":[22],"preprocessing":[23],"techniques,":[24],"interpolation":[25,58,97,106],"may":[26],"weaken":[27],"robustness":[29],"attack":[32,45,53,63,73,112,125],"and":[33,86],"even":[34],"disable":[35],"perturbation.":[37,68],"Thus,":[38],"malicious":[40],"images":[41],"cannot":[42],"achieve":[43,78,122],"purpose.":[46],"In":[47],"this":[48],"work,":[49],"anti-interpolation,":[50,71],"as":[51],"an":[52,72],"facilitator,":[54],"is":[55,75,92,130],"proposed,":[56],"where":[57],"does":[59],"not":[60],"affect":[61],"results":[64],"intended":[65],"by":[66],"Based":[69],"on":[70,95],"framework":[74],"extended":[76],"attacks,":[80,119],"including":[81],"targeted":[82],"attack,":[83,85],"non-targeted":[84],"auxiliary":[87],"attack.":[88],"Furthermore,":[89],"gradient":[90],"derivation":[91],"developed":[93],"based":[94],"output":[98],"large-sized":[100],"images,":[101],"infer":[104],"mode":[107],"in":[108],"black":[110],"box":[111],"scenario.":[113],"Compared":[114],"with":[115,136],"current":[117],"anti-interpolation":[120,129],"a":[123],"higher":[124],"success":[126],"rate.":[127],"Moreover,":[128],"capable":[131],"attacking":[133],"defensive":[134],"various":[137],"model":[138],"corrections.":[139]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
