{"id":"https://openalex.org/W3210073512","doi":"https://doi.org/10.1109/tdsc.2021.3123586","title":"Generating Adversarial Examples With Distance Constrained Adversarial Imitation Networks","display_name":"Generating Adversarial Examples With Distance Constrained Adversarial Imitation Networks","publication_year":2021,"publication_date":"2021-10-27","ids":{"openalex":"https://openalex.org/W3210073512","doi":"https://doi.org/10.1109/tdsc.2021.3123586","mag":"3210073512"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2021.3123586","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2021.3123586","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077392999","display_name":"Pengfei Tang","orcid":"https://orcid.org/0000-0002-4187-4439"},"institutions":[{"id":"https://openalex.org/I150468666","display_name":"Emory University","ror":"https://ror.org/03czfpz43","country_code":"US","type":"education","lineage":["https://openalex.org/I150468666"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Pengfei Tang","raw_affiliation_strings":["Department of Computer Science, Emory University, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Emory University, Atlanta, GA, USA","institution_ids":["https://openalex.org/I150468666"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100368524","display_name":"Wenjie Wang","orcid":"https://orcid.org/0000-0002-5199-1428"},"institutions":[{"id":"https://openalex.org/I150468666","display_name":"Emory University","ror":"https://ror.org/03czfpz43","country_code":"US","type":"education","lineage":["https://openalex.org/I150468666"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenjie Wang","raw_affiliation_strings":["Department of Computer Science, Emory University, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Emory University, Atlanta, GA, USA","institution_ids":["https://openalex.org/I150468666"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041918034","display_name":"Jian Lou","orcid":"https://orcid.org/0000-0002-4110-2068"},"institutions":[{"id":"https://openalex.org/I150468666","display_name":"Emory University","ror":"https://ror.org/03czfpz43","country_code":"US","type":"education","lineage":["https://openalex.org/I150468666"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jian Lou","raw_affiliation_strings":["Department of Computer Science, Emory University, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Emory University, Atlanta, GA, USA","institution_ids":["https://openalex.org/I150468666"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078394535","display_name":"Li Xiong","orcid":"https://orcid.org/0000-0001-7354-0428"},"institutions":[{"id":"https://openalex.org/I150468666","display_name":"Emory University","ror":"https://ror.org/03czfpz43","country_code":"US","type":"education","lineage":["https://openalex.org/I150468666"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Li Xiong","raw_affiliation_strings":["Department of Computer Science, Emory University, Atlanta, GA, USA","Department of Biomedical Informatics, Emory University, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Emory University, Atlanta, GA, USA","institution_ids":["https://openalex.org/I150468666"]},{"raw_affiliation_string":"Department of Biomedical Informatics, Emory University, Atlanta, GA, USA","institution_ids":["https://openalex.org/I150468666"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5077392999"],"corresponding_institution_ids":["https://openalex.org/I150468666"],"apc_list":null,"apc_paid":null,"fwci":1.6316,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.868261,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"19","issue":"6","first_page":"4145","last_page":"4155"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.9747999906539917,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9546999931335449,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8676551580429077},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7147295475006104},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5139481425285339},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.4863146245479584},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4157978594303131},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35217350721359253},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3243662118911743}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8676551580429077},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7147295475006104},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5139481425285339},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.4863146245479584},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4157978594303131},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35217350721359253},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3243662118911743}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2021.3123586","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2021.3123586","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6793461003","display_name":null,"funder_award_id":"CNS- 2124104","funder_id":"https://openalex.org/F4320335353","funder_display_name":"National Science Foundation of Sri Lanka"}],"funders":[{"id":"https://openalex.org/F4320335353","display_name":"National Science Foundation of Sri Lanka","ror":"https://ror.org/010xaa060"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W1673923490","https://openalex.org/W1945616565","https://openalex.org/W2100495367","https://openalex.org/W2108598243","https://openalex.org/W2112796928","https://openalex.org/W2125389028","https://openalex.org/W2145287260","https://openalex.org/W2163605009","https://openalex.org/W2165698076","https://openalex.org/W2180612164","https://openalex.org/W2194775991","https://openalex.org/W2243397390","https://openalex.org/W2461943168","https://openalex.org/W2551176409","https://openalex.org/W2592232824","https://openalex.org/W2735090526","https://openalex.org/W2781800156","https://openalex.org/W2804078698","https://openalex.org/W2890591829","https://openalex.org/W2927692314","https://openalex.org/W2937975254","https://openalex.org/W2951326654","https://openalex.org/W2953384591","https://openalex.org/W2963091558","https://openalex.org/W2963389226","https://openalex.org/W2963448658","https://openalex.org/W2963567641","https://openalex.org/W2963693747","https://openalex.org/W2963857521","https://openalex.org/W2964318098","https://openalex.org/W2994027480","https://openalex.org/W3083269515","https://openalex.org/W3102360395","https://openalex.org/W4288092002","https://openalex.org/W4320013936","https://openalex.org/W4385245566","https://openalex.org/W6631190155","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6678815747","https://openalex.org/W6684191040","https://openalex.org/W6713134421","https://openalex.org/W6727654133","https://openalex.org/W6729756640","https://openalex.org/W6739901393","https://openalex.org/W6752378368","https://openalex.org/W6754438973","https://openalex.org/W6762006657"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W4246396837","https://openalex.org/W2482350142","https://openalex.org/W3176240006","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4288019534","https://openalex.org/W4310988119"],"abstract_inverted_index":{"Recent":[0],"studies":[1],"have":[2,35,81],"shown":[3],"that":[4,12,169],"neural":[5],"networks":[6],"are":[7,13],"vulnerable":[8],"to":[9,19,24,28,60],"adversarial":[10,40,67,74,78,146,187],"examples":[11,21,41,79,133,147],"designed":[14],"by":[15],"adding":[16],"small":[17,94],"perturbations":[18,87],"clean":[20],"in":[22,151,182],"order":[23],"trick":[25],"the":[26,77,156,183],"classifier":[27],"misclassify.":[29],"Various":[30],"approaches":[31],"based":[32,47,180,196],"on":[33],"optimization":[34,195],"been":[36],"proposed":[37],"for":[38],"generating":[39,128],"with":[42,84,134],"minimal":[43],"perturbation.":[44],"Model":[45],"training":[46],"methods":[48,181,197],"such":[49],"as":[50,149],"Adversarial":[51,177],"Transformation":[52],"Network":[53],"(ATN)":[54],"provide":[55],"a":[56,101],"fundamentally":[57],"new":[58],"way":[59],"directly":[61],"transform":[62],"an":[63,66,135],"input":[64],"into":[65],"example,":[68],"which":[69,121],"promises":[70],"fast":[71],"generation":[72],"of":[73,127,158,185],"examples.":[75],"However,":[76],"may":[80],"suboptimal":[82],"quality":[83,184],"significantly":[85,171],"large":[86,144],"or":[88],"low":[89],"attack":[90],"success":[91],"rate":[92],"at":[93],"perturbations.":[95],"In":[96],"this":[97],"article,":[98],"we":[99],"propose":[100],"distance":[102,137],"constrained":[103],"<bold":[104,108,112,117],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[105,109,113,118],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">A</b>":[106],"dversarial":[107],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">I</b>":[110],"mitation":[111],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">N</b>":[114],"etwork":[115],"(":[116],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">AIN</b>":[119],"),":[120],"enhances":[122],"ATN":[123,173],"and":[124,131,174,189],"is":[125,190],"capable":[126],"both":[129],"targeted":[130],"untargeted":[132],"explicit":[136],"constraint.":[138],"AIN":[139,170],"can":[140],"not":[141],"only":[142],"generate":[143],"scale":[145],"efficiently":[148],"achieved":[150],"ATN,":[152],"but":[153],"also":[154],"imitate":[155],"behavior":[157],"state-of-the-art":[159],"optimization-based":[160],"methods,":[161],"hence":[162],"achieving":[163,199],"improved":[164],"quality.":[165,201],"Extensive":[166],"experiments":[167],"show":[168],"outperforms":[172],"other":[175],"Generative":[176],"Networks":[178],"(GAN)":[179],"generated":[186],"examples,":[188],"much":[191],"more":[192],"efficient":[193],"than":[194],"while":[198],"comparable":[200]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
