{"id":"https://openalex.org/W2966579212","doi":"https://doi.org/10.1109/tdsc.2019.2929047","title":"Invisible Adversarial Attack against Deep Neural Networks: An Adaptive Penalization Approach","display_name":"Invisible Adversarial Attack against Deep Neural Networks: An Adaptive Penalization Approach","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2966579212","doi":"https://doi.org/10.1109/tdsc.2019.2929047","mag":"2966579212"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2019.2929047","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2019.2929047","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100422345","display_name":"Zhibo Wang","orcid":"https://orcid.org/0000-0002-5804-3279"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhibo Wang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085556383","display_name":"Mengkai Song","orcid":"https://orcid.org/0000-0002-7907-3469"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengkai Song","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008199069","display_name":"Siyan Zheng","orcid":"https://orcid.org/0000-0003-0881-8950"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siyan Zheng","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114860359","display_name":"Zhifei Zhang","orcid":"https://orcid.org/0000-0003-0466-9548"},"institutions":[{"id":"https://openalex.org/I75027704","display_name":"University of Tennessee at Knoxville","ror":"https://ror.org/020f3ap87","country_code":"US","type":"education","lineage":["https://openalex.org/I75027704"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhifei Zhang","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, University of Tennessee, Knoxville, TN, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, University of Tennessee, Knoxville, TN, USA","institution_ids":["https://openalex.org/I75027704"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041567418","display_name":"Yang Song","orcid":"https://orcid.org/0000-0003-1283-1672"},"institutions":[{"id":"https://openalex.org/I75027704","display_name":"University of Tennessee at Knoxville","ror":"https://ror.org/020f3ap87","country_code":"US","type":"education","lineage":["https://openalex.org/I75027704"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yang Song","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, University of Tennessee, Knoxville, TN, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, University of Tennessee, Knoxville, TN, USA","institution_ids":["https://openalex.org/I75027704"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100391116","display_name":"Qian Wang","orcid":"https://orcid.org/0000-0002-8967-8525"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Wang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100422345"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":3.7574,"has_fulltext":false,"cited_by_count":46,"citation_normalized_percentile":{"value":0.94701157,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.974399983882904,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.9707000255584717,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mnist-database","display_name":"MNIST database","score":0.6856845617294312},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6794562339782715},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.581824541091919},{"id":"https://openalex.org/keywords/notation","display_name":"Notation","score":0.5649124979972839},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5278218388557434},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.5073511004447937},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5024409294128418},{"id":"https://openalex.org/keywords/norm","display_name":"Norm (philosophy)","score":0.4759618639945984},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.44134968519210815},{"id":"https://openalex.org/keywords/hessian-matrix","display_name":"Hessian matrix","score":0.43516767024993896},{"id":"https://openalex.org/keywords/weighting","display_name":"Weighting","score":0.43103331327438354},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3487294018268585},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3336620330810547},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3234201669692993},{"id":"https://openalex.org/keywords/applied-mathematics","display_name":"Applied mathematics","score":0.133693665266037},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.09858328104019165}],"concepts":[{"id":"https://openalex.org/C190502265","wikidata":"https://www.wikidata.org/wiki/Q17069496","display_name":"MNIST database","level":3,"score":0.6856845617294312},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6794562339782715},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.581824541091919},{"id":"https://openalex.org/C45357846","wikidata":"https://www.wikidata.org/wiki/Q2001982","display_name":"Notation","level":2,"score":0.5649124979972839},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5278218388557434},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.5073511004447937},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5024409294128418},{"id":"https://openalex.org/C191795146","wikidata":"https://www.wikidata.org/wiki/Q3878446","display_name":"Norm (philosophy)","level":2,"score":0.4759618639945984},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.44134968519210815},{"id":"https://openalex.org/C203616005","wikidata":"https://www.wikidata.org/wiki/Q620495","display_name":"Hessian matrix","level":2,"score":0.43516767024993896},{"id":"https://openalex.org/C183115368","wikidata":"https://www.wikidata.org/wiki/Q856577","display_name":"Weighting","level":2,"score":0.43103331327438354},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3487294018268585},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3336620330810547},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3234201669692993},{"id":"https://openalex.org/C28826006","wikidata":"https://www.wikidata.org/wiki/Q33521","display_name":"Applied mathematics","level":1,"score":0.133693665266037},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.09858328104019165},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C126838900","wikidata":"https://www.wikidata.org/wiki/Q77604","display_name":"Radiology","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2019.2929047","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2019.2929047","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2678750249","display_name":null,"funder_award_id":"61872274","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W9657784","https://openalex.org/W1673923490","https://openalex.org/W1945616565","https://openalex.org/W1986533012","https://openalex.org/W2052558963","https://openalex.org/W2108598243","https://openalex.org/W2136477141","https://openalex.org/W2139885889","https://openalex.org/W2144520790","https://openalex.org/W2160815625","https://openalex.org/W2163605009","https://openalex.org/W2177870565","https://openalex.org/W2180612164","https://openalex.org/W2183341477","https://openalex.org/W2230740169","https://openalex.org/W2243397390","https://openalex.org/W2326925005","https://openalex.org/W2432142698","https://openalex.org/W2460937040","https://openalex.org/W2471002157","https://openalex.org/W2535873859","https://openalex.org/W2570685808","https://openalex.org/W2767241473","https://openalex.org/W2783784437","https://openalex.org/W2793967506","https://openalex.org/W2879765882","https://openalex.org/W2902867332","https://openalex.org/W2941750187","https://openalex.org/W2963073614","https://openalex.org/W2963098487","https://openalex.org/W2963207607","https://openalex.org/W2963366334","https://openalex.org/W2963448658","https://openalex.org/W2963572611","https://openalex.org/W2963857521","https://openalex.org/W2964082701","https://openalex.org/W2964153729","https://openalex.org/W2969249185","https://openalex.org/W3103557498","https://openalex.org/W3103836116","https://openalex.org/W3118608800","https://openalex.org/W4256044039","https://openalex.org/W4300511536","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6684191040","https://openalex.org/W6689238212","https://openalex.org/W6717848421","https://openalex.org/W6719080892","https://openalex.org/W6731927902","https://openalex.org/W6747473890","https://openalex.org/W6785841629","https://openalex.org/W6787972765"],"related_works":["https://openalex.org/W2950183588","https://openalex.org/W3080754722","https://openalex.org/W3093978547","https://openalex.org/W2953536436","https://openalex.org/W3203790781","https://openalex.org/W4313346231","https://openalex.org/W2738001131","https://openalex.org/W4285785480","https://openalex.org/W2997056298","https://openalex.org/W4298079292"],"abstract_inverted_index":{"Recent":[0],"studies":[1],"demonstrated":[2],"that":[3,97,224],"deep":[4],"neural":[5],"networks":[6],"(DNNs)":[7],"are":[8,98,134],"vulnerable":[9],"to":[10,37,59,110,113,163],"adversarial":[11,23,48,91,95,132,173,246,251],"examples,":[12],"which":[13,41,93,154],"would":[14],"seriously":[15],"threaten":[16],"security-sensitive":[17],"applications.":[18],"Existing":[19],"works":[20],"synthesized":[21],"the":[22,27,32,39,43,47,60,107,118,122,125,150,156,160,176,185,194,206,234,243,258],"examples":[24,96,252],"by":[25,30,149,192],"perturbing":[26],"original/benign":[28],"images":[29,49,62],"leveraging":[31],"<inline-formula><tex-math":[33,144,179,226,238],"notation=\"LaTeX\">$\\mathcal":[34,145,239],"{L}_p$</tex-math></inline-formula>":[35,146,240],"-norm":[36,147],"penalize":[38],"perturbations,":[40],"restricts":[42],"pixel-wise":[44,195],"distance":[45],"between":[46],"and":[50,81,138,188,209,212,242,256],"correspondingly":[51],"benign":[52,61,102,119,254],"images.":[53],"However,":[54],"they":[55],"added":[56],"perturbations":[57],"globally":[58],"without":[63],"explicitly":[64],"considering":[65],"their":[66],"content/spacial":[67],"structure,":[68],"resulting":[69],"in":[70,74,117],"noticeable":[71],"artifacts":[72],"especially":[73],"those":[75],"originally":[76],"clean":[77],"regions,":[78],"e.g.,":[79],"sky":[80],"smooth":[82],"surface.":[83],"In":[84],"this":[85],"paper,":[86],"we":[87],"propose":[88],"an":[89,199],"invisible":[90],"attack,":[92,174],"synthesizes":[94],"visually":[99],"indistinguishable":[100,250],"from":[101,253],"ones.":[103],"We":[104,201],"adaptively":[105,189],"distribute":[106],"perturbation":[108],"according":[109],"human":[111],"sensitivity":[112],"a":[114,213,229],"local":[115],"stimulus":[116],"image,":[120],"i.e.,":[121],"higher":[123],"insensitivity,":[124],"more":[126],"perturbation.":[127,165],"Two":[128],"types":[129],"of":[130,159,198],"adaptive":[131,245],"attacks":[133,247],"proposed:":[135],"1)":[136],"coarse-grained":[137],"2)":[139],"fine-grained.":[140],"The":[141,166,220],"former":[142],"conducts":[143],"regularized":[148],"novel":[151],"spatial":[152],"constraints,":[153],"utilizes":[155,175],"rich":[157],"information":[158],"cluttered":[161],"regions":[162],"mask":[164],"latter,":[167],"called":[168],"Just":[169],"Noticeable":[170],"Distortion":[171],"(JND)-based":[172],"proposed":[177,244],"JND":[178,225],"notation=\"LaTeX\">$_p$</tex-math></inline-formula>":[180,227],"metric":[181,231],"for":[182,232],"better":[183,230],"measuring":[184,233],"perceptual":[186,196,235],"similarity,":[187],"sets":[190],"penalty":[191],"weighting":[193],"redundancy":[197],"image.":[200],"conduct":[202],"extensive":[203],"experiments":[204],"on":[205],"MNIST,":[207],"CIFAR-10":[208],"ImageNet":[210],"datasets":[211],"comprehensive":[214],"user":[215],"study":[216],"with":[217],"50":[218],"participants.":[219],"experimental":[221],"results":[222],"demonstrate":[223],"is":[228],"similarity":[236],"than":[237],"-norm,":[241],"can":[248],"synthesize":[249],"ones":[255],"outperform":[257],"state-of-the-art":[259],"methods.":[260]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
