{"id":"https://openalex.org/W4226255806","doi":"https://doi.org/10.1109/tdsc.2022.3163397","title":"Stealthy 3D Poisoning Attack on Video Recognition Models","display_name":"Stealthy 3D Poisoning Attack on Video Recognition Models","publication_year":2023,"publication_date":"2023-03-01","ids":{"openalex":"https://openalex.org/W4226255806","doi":"https://doi.org/10.1109/tdsc.2022.3163397"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3163397","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1941-0018","1545-5971","2160-9209"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068042573","display_name":"Shangyu Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shangyu Xie","raw_affiliation_string":"Computer Science, Illinois Institute of Technology, 2455 Chicago, Illinois, United States","raw_affiliation_strings":["Computer Science, Illinois Institute of Technology, 2455 Chicago, Illinois, United States"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048411184","display_name":"Yan Yan","orcid":"https://orcid.org/0000-0002-5917-1475"},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yan Yan","raw_affiliation_string":"Computer Science, Illinois Institute of Technology, 2455 Chicago, Illinois, United States, 60616-3717","raw_affiliation_strings":["Computer Science, Illinois Institute of Technology, 2455 Chicago, Illinois, United States, 60616-3717"]},{"author_position":"last","author":{"id":"https://openalex.org/A5061498444","display_name":"Hong Yuan","orcid":"https://orcid.org/0000-0003-4095-4506"},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuan Hong","raw_affiliation_string":"Computer Science, Illinois Institute of Technology, Chicago, Illinois, United States, 60616","raw_affiliation_strings":["Computer Science, Illinois Institute of Technology, Chicago, Illinois, United States, 60616"]}],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"has_fulltext":false,"cited_by_count":2,"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"20","issue":"2","first_page":"1730","last_page":"1743"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Deep Learning Models","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Deep Learning Models","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection in High-Dimensional Data","score":0.9769,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10318","display_name":"Impact of Mass Incarceration on Society and Individuals","score":0.9313,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"keyword":"stealthy 3d poisoning attack","score":0.7677},{"keyword":"recognition","score":0.3899},{"keyword":"models","score":0.2868}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6829396},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.6274413},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4971371},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.48895323},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4609111},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.41340986},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35650137},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14524803},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3163397","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1941-0018","1545-5971","2160-9209"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.41}],"grants":[{"funder":"https://openalex.org/F4320335353","funder_display_name":"National Science Foundation of Sri Lanka","award_id":"CNS-2034870"},{"funder":"https://openalex.org/F4320335353","funder_display_name":"National Science Foundation of Sri Lanka","award_id":"CNS-2046335"}],"referenced_works_count":29,"referenced_works":["https://openalex.org/W9657784","https://openalex.org/W1522734439","https://openalex.org/W2126579184","https://openalex.org/W2133665775","https://openalex.org/W2169216879","https://openalex.org/W2498672755","https://openalex.org/W2543927648","https://openalex.org/W2560474170","https://openalex.org/W2603766943","https://openalex.org/W2753766497","https://openalex.org/W2807363941","https://openalex.org/W2887280559","https://openalex.org/W2934843808","https://openalex.org/W2947874337","https://openalex.org/W2963524571","https://openalex.org/W2963795951","https://openalex.org/W2963857521","https://openalex.org/W2973021304","https://openalex.org/W2983041926","https://openalex.org/W2983838625","https://openalex.org/W2984287396","https://openalex.org/W2990152177","https://openalex.org/W2996800219","https://openalex.org/W3034414373","https://openalex.org/W3034572008","https://openalex.org/W3101903411","https://openalex.org/W3175215793","https://openalex.org/W3179761913","https://openalex.org/W4239515185"],"related_works":["https://openalex.org/W4380075502","https://openalex.org/W3162204513","https://openalex.org/W4375867731","https://openalex.org/W2371138613","https://openalex.org/W2048963458","https://openalex.org/W43109613","https://openalex.org/W2359952343","https://openalex.org/W2080152487","https://openalex.org/W2239445980","https://openalex.org/W2995553446"],"ngrams_url":"https://api.openalex.org/works/W4226255806/ngrams","abstract_inverted_index":{"Deep":[0],"Neural":[1],"Networks":[2],"(DNNs)":[3],"have":[4,180],"been":[5],"proven":[6],"to":[7,10,28,77,144,172,190],"be":[8,75,169],"vulnerable":[9],"poisoning":[11,38,52,63,108,121,166],"attacks":[12,39,53],"that":[13],"poison":[14],"the":[15,25,37,46,50,61,70,80,83,113,141,156,173,183],"training":[16],"data":[17,30],"with":[18,176,195],"a":[19,103,119],"trigger":[20,64,122],"pattern":[21],"and":[22,56,95,106,131,159],"thus":[23,160],"manipulate":[24],"trained":[26],"model":[27],"misclassify":[29],"instances.":[31],"In":[32],"this":[33],"article,":[34],"we":[35,101,117,134],"study":[36],"on":[40,54],"video":[41,71],"recognition":[42],"models.":[43],"We":[44,179],"reveal":[45],"major":[47],"limitations":[48],"of":[49,185],"state-of-the-art":[51],"stealthiness":[55],"attack":[57],"effectiveness":[58],":":[59],"(i)":[60,116],"frame-by-frame":[62],"may":[65],"cause":[66],"temporal":[67,129],"inconsistency":[68],"among":[69],"frames":[72],"which":[73,111,126,148],"can":[74,127,168],"leveraged":[76],"easily":[78],"detect":[79],"attack;":[81],"(ii)":[82,133],"feature":[84,157],"collision-based":[85],"method":[86],"for":[87],"crafting":[88],"poisoned":[89,146,202],"videos":[90],"could":[91,149],"lack":[92],"both":[93],"generalization":[94],"transferability.":[96,178],"To":[97],"address":[98],"these":[99],"limitations,":[100],"propose":[102],"novel":[104],"stealthy":[105],"efficient":[107],"attack":[109,138,167,187],"framework":[110],"has":[112],"following":[114],"advantages:":[115],"design":[118],"3D":[120],"as":[123,140],"natural-like":[124],"textures,":[125],"maintain":[128],"consistency":[130],"human-imperceptibility;":[132],"formulate":[135],"an":[136],"ensemble":[137],"oracle":[139],"optimization":[142],"objective":[143],"craft":[145],"videos,":[147],"construct":[150],"convex":[151],"polytope-like":[152],"adversarial":[153],"subspaces":[154],"in":[155],"space":[158],"gain":[161],"more":[162],"generalization;":[163],"(iii)":[164],"our":[165,186],"readily":[170],"extended":[171],"black-box":[174],"setting":[175],"good":[177],"experimentally":[181],"validated":[182],"effectiveness":[184],"(e.g.,":[188],"up":[189],"$95\\%$":[192],"success":[193],"rates":[194],"only":[196],"less":[197],"than":[198],"notation=\"LaTeX\">$\\sim":[200],"0.5\\%$":[201],"dataset).":[203]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4226255806","counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2024-03-24T12:14:18.455760","created_date":"2022-05-05"}