{"id":"https://openalex.org/W2908257321","doi":"https://doi.org/10.1109/tdsc.2019.2943467","title":"Adversarial Examples Versus Cloud-based Detectors: A Black-box Empirical Study","display_name":"Adversarial Examples Versus Cloud-based Detectors: A Black-box Empirical Study","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2908257321","doi":"https://doi.org/10.1109/tdsc.2019.2943467","mag":"2908257321"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2019.2943467","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2019.2943467","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1901.01223","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101797260","display_name":"Xurong Li","orcid":"https://orcid.org/0000-0002-9671-8978"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xurong Li","raw_affiliation_strings":["Institute of Cyberspace Research and the College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"Institute of Cyberspace Research and the College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058611515","display_name":"Shouling Ji","orcid":"https://orcid.org/0000-0003-4268-372X"},"institutions":[{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shouling Ji","raw_affiliation_strings":["Alibaba-Zhejiang University Joint Institute of Frontier Technologies (A.Z.F.T.), Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Alibaba-Zhejiang University Joint Institute of Frontier Technologies (A.Z.F.T.), Hangzhou, China","institution_ids":["https://openalex.org/I45928872","https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015874426","display_name":"Meng Han","orcid":"https://orcid.org/0000-0003-1933-2067"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Meng Han","raw_affiliation_strings":["School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA","<org_name>School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA</org_name>"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"<org_name>School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA</org_name>","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020312513","display_name":"Juntao Ji","orcid":"https://orcid.org/0000-0001-9150-042X"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Juntao Ji","raw_affiliation_strings":["Institute of Cyberspace Research and the College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"Institute of Cyberspace Research and the College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091386298","display_name":"Zhenyu Ren","orcid":"https://orcid.org/0000-0003-3625-8030"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenyu Ren","raw_affiliation_strings":["Institute of Cyberspace Research and the College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"Institute of Cyberspace Research and the College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100670240","display_name":"Yushan Liu","orcid":"https://orcid.org/0009-0009-7607-3306"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yushan Liu","raw_affiliation_strings":["College of Computing and Software Engineering, Kennesaw State University, Marietta, GA, USA","[College of Computing and Software Engineering, Kennesaw State University, Marietta, GA, USA]"],"affiliations":[{"raw_affiliation_string":"College of Computing and Software Engineering, Kennesaw State University, Marietta, GA, USA","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"[College of Computing and Software Engineering, Kennesaw State University, Marietta, GA, USA]","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078198240","display_name":"Chunming Wu","orcid":"https://orcid.org/0000-0001-7958-9687"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunming Wu","raw_affiliation_strings":["Institute of Cyberspace Research and the College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"Institute of Cyberspace Research and the College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5101797260"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":1.0116,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.82132156,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8677247762680054},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7488664984703064},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6098681688308716},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5682972073554993},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5324519872665405},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.531195342540741},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5040539503097534},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.480951726436615},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.47600898146629333},{"id":"https://openalex.org/keywords/object-detection","display_name":"Object detection","score":0.47176364064216614},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.4441729485988617},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4434940218925476},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.44344696402549744},{"id":"https://openalex.org/keywords/segmentation","display_name":"Segmentation","score":0.42997321486473083},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.41450604796409607},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.41148796677589417},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3253716826438904}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8677247762680054},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7488664984703064},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6098681688308716},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5682972073554993},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5324519872665405},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.531195342540741},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5040539503097534},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.480951726436615},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.47600898146629333},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.47176364064216614},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.4441729485988617},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4434940218925476},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.44344696402549744},{"id":"https://openalex.org/C89600930","wikidata":"https://www.wikidata.org/wiki/Q1423946","display_name":"Segmentation","level":2,"score":0.42997321486473083},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.41450604796409607},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.41148796677589417},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3253716826438904},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tdsc.2019.2943467","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2019.2943467","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1901.01223","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1901.01223","pdf_url":"https://arxiv.org/pdf/1901.01223","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"doi:10.48550/arxiv.1901.01223","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1901.01223","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"},{"id":"mag:2908257321","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1901.01223","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1901.01223","pdf_url":"https://arxiv.org/pdf/1901.01223","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6600000262260437}],"awards":[{"id":"https://openalex.org/G1411002916","display_name":null,"funder_award_id":"2018YFB1800601","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G6994201786","display_name":null,"funder_award_id":"U1836202","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7021125818","display_name":null,"funder_award_id":"61772466","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8970848614","display_name":null,"funder_award_id":"2018YFB2100404","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":67,"referenced_works":["https://openalex.org/W1686810756","https://openalex.org/W1903029394","https://openalex.org/W2051267297","https://openalex.org/W2067713319","https://openalex.org/W2097728669","https://openalex.org/W2133665775","https://openalex.org/W2174868984","https://openalex.org/W2180612164","https://openalex.org/W2183341477","https://openalex.org/W2194775991","https://openalex.org/W2243397390","https://openalex.org/W2269778407","https://openalex.org/W2285181575","https://openalex.org/W2460937040","https://openalex.org/W2461943168","https://openalex.org/W2516574342","https://openalex.org/W2535690855","https://openalex.org/W2563705555","https://openalex.org/W2598666589","https://openalex.org/W2603766943","https://openalex.org/W2607219512","https://openalex.org/W2608583225","https://openalex.org/W2620038827","https://openalex.org/W2736899637","https://openalex.org/W2745565856","https://openalex.org/W2746600820","https://openalex.org/W2748074830","https://openalex.org/W2754049786","https://openalex.org/W2767866064","https://openalex.org/W2767962654","https://openalex.org/W2775467454","https://openalex.org/W2776514146","https://openalex.org/W2776884785","https://openalex.org/W2781152419","https://openalex.org/W2781758978","https://openalex.org/W2782217514","https://openalex.org/W2797359501","https://openalex.org/W2950864148","https://openalex.org/W2962700793","https://openalex.org/W2963070423","https://openalex.org/W2963173190","https://openalex.org/W2963207607","https://openalex.org/W2963564844","https://openalex.org/W2963744840","https://openalex.org/W2963857521","https://openalex.org/W2963881378","https://openalex.org/W2964082701","https://openalex.org/W2964153729","https://openalex.org/W2964288706","https://openalex.org/W2964318098","https://openalex.org/W6637162671","https://openalex.org/W6637373629","https://openalex.org/W6640295612","https://openalex.org/W6640425456","https://openalex.org/W6696022951","https://openalex.org/W6719080892","https://openalex.org/W6731927902","https://openalex.org/W6741036071","https://openalex.org/W6743048048","https://openalex.org/W6745710499","https://openalex.org/W6746402973","https://openalex.org/W6746449270","https://openalex.org/W6746608116","https://openalex.org/W6747438147","https://openalex.org/W6747489574","https://openalex.org/W6750404860","https://openalex.org/W6929233984"],"related_works":["https://openalex.org/W2998887836","https://openalex.org/W2999315220","https://openalex.org/W2167106675","https://openalex.org/W3041709334","https://openalex.org/W3119841746","https://openalex.org/W3099976866","https://openalex.org/W3162403368","https://openalex.org/W2342039013","https://openalex.org/W2186797525","https://openalex.org/W1457396147","https://openalex.org/W1860404153","https://openalex.org/W2760355118","https://openalex.org/W2018671131","https://openalex.org/W3087196177","https://openalex.org/W2794283719","https://openalex.org/W1543038458","https://openalex.org/W3184396788","https://openalex.org/W3041651560","https://openalex.org/W3168914511","https://openalex.org/W3132424959"],"abstract_inverted_index":{"Deep":[0],"learning":[1,39],"has":[2],"been":[3],"broadly":[4],"leveraged":[5],"by":[6],"major":[7,133],"cloud":[8,134],"providers,":[9],"such":[10,179],"as":[11,180],"Google,":[12],"AWS":[13],"and":[14,106,142,162,183],"Baidu,":[15],"to":[16,44,95,113],"offer":[17],"various":[18],"computer":[19],"vision":[20],"related":[21],"services":[22],"including":[23],"image":[24,29,48,82,125,149],"classification,":[25],"object":[26],"identification,":[27],"illegal":[28],"detection,":[30],"etc.":[31],"While":[32],"recent":[33],"works":[34],"extensively":[35],"demonstrated":[36],"that":[37,147],"deep":[38],"classification":[40],"models":[41],"are":[42,52],"vulnerable":[43],"adversarial":[45,98],"examples,":[46],"cloud-based":[47,81,124],"detection":[49,177],"models,":[50],"which":[51],"more":[53],"complicated":[54],"than":[55],"classifiers,":[56],"may":[57],"also":[58,187],"have":[59,168],"similar":[60],"security":[61,77,195],"concern":[62],"but":[63],"not":[64],"get":[65],"enough":[66],"attention":[67],"yet.":[68],"In":[69],"this":[70],"paper,":[71],"we":[72,91,108,145],"mainly":[73],"focus":[74],"on":[75,87,131],"the":[76,110,128,163,198],"issues":[78],"of":[79,119,158],"real-world":[80,123],"detectors.":[83,126],"Specifically,":[84],"(1)":[85],"based":[86,151,166],"effective":[88],"semantic":[89,164],"segmentation,":[90],"propose":[92],"four":[93],"attacks":[94,121,152,167],"generate":[96],"semantics-aware":[97],"examples":[99],"via":[100],"only":[101],"interacting":[102],"with":[103],"black-box":[104,120],"APIs;":[105],"(2)":[107],"make":[109],"first":[111],"attempt":[112],"conduct":[114],"an":[115],"extensive":[116],"empirical":[117],"study":[118],"against":[122],"Through":[127],"comprehensive":[129],"evaluations":[130],"five":[132],"platforms:":[135],"AWS,":[136],"Azure,":[137],"Google":[138],"Cloud,":[139,141,144],"Baidu":[140],"Alibaba":[143],"demonstrate":[146],"our":[148],"processing":[150],"can":[153],"reach":[154],"a":[155,169],"success":[156,170],"rate":[157,171],"approximately":[159],"100":[160],"percent,":[161],"segmentation":[165],"over":[172],"90":[173],"percent":[174],"among":[175],"different":[176],"services,":[178],"violence,":[181],"politician,":[182],"pornography":[184],"detection.":[185],"We":[186],"proposed":[188],"several":[189],"possible":[190],"defense":[191],"strategies":[192],"for":[193],"these":[194],"challenges":[196],"in":[197],"real-life":[199],"situation.":[200]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2019-01-11T00:00:00"}
