{"id":"https://openalex.org/W4293499149","doi":"https://doi.org/10.1109/tdsc.2022.3202544","title":"Interpreting Universal Adversarial Example Attacks on Image Classification Models","display_name":"Interpreting Universal Adversarial Example Attacks on Image Classification Models","publication_year":2022,"publication_date":"2022-08-29","ids":{"openalex":"https://openalex.org/W4293499149","doi":"https://doi.org/10.1109/tdsc.2022.3202544"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2022.3202544","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3202544","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030009218","display_name":"Yi Ding","orcid":null},"institutions":[{"id":"https://openalex.org/I13591777","display_name":"University of Nottingham Ningbo China","ror":"https://ror.org/03y4dt428","country_code":"CN","type":"education","lineage":["https://openalex.org/I13591777","https://openalex.org/I142263535"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yi Ding","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China","Ningbo WebKing Technology Joint Stock Co.,Ltd, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Ningbo WebKing Technology Joint Stock Co.,Ltd, China","institution_ids":["https://openalex.org/I13591777"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101637248","display_name":"Fuyuan Tan","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fuyuan Tan","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112194243","display_name":"Geng Ji","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ji Geng","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100763095","display_name":"Zhen Qin","orcid":"https://orcid.org/0000-0001-7857-9719"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Qin","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088153559","display_name":"Mingsheng Cao","orcid":"https://orcid.org/0000-0003-0691-2724"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingsheng Cao","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045032131","display_name":"Zhiguang Qin","orcid":"https://orcid.org/0000-0001-6745-6377"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiguang Qin","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5030009218"],"corresponding_institution_ids":["https://openalex.org/I13591777","https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":2.3449,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.90080327,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"20","issue":"4","first_page":"3392","last_page":"3407"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11515","display_name":"Bacillus and Francisella bacterial research","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9713000059127808,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.9232065081596375},{"id":"https://openalex.org/keywords/discriminator","display_name":"Discriminator","score":0.7670294642448425},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7387944459915161},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6404423713684082},{"id":"https://openalex.org/keywords/contextual-image-classification","display_name":"Contextual image classification","score":0.6086440086364746},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5449749827384949},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.518826425075531},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.5121212005615234},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4853431284427643},{"id":"https://openalex.org/keywords/binary-classification","display_name":"Binary classification","score":0.47275811433792114},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.462807834148407},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.45513901114463806},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.413776695728302},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.1394045054912567}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.9232065081596375},{"id":"https://openalex.org/C2779803651","wikidata":"https://www.wikidata.org/wiki/Q5282088","display_name":"Discriminator","level":3,"score":0.7670294642448425},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7387944459915161},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6404423713684082},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.6086440086364746},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5449749827384949},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.518826425075531},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.5121212005615234},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4853431284427643},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.47275811433792114},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.462807834148407},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.45513901114463806},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.413776695728302},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.1394045054912567},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2022.3202544","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3202544","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.699999988079071,"display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G2586345122","display_name":null,"funder_award_id":"62076054","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3352946381","display_name":null,"funder_award_id":"62072074","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7202444375","display_name":null,"funder_award_id":"62027827","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7337167594","display_name":null,"funder_award_id":"61902054","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7568062542","display_name":null,"funder_award_id":"62002047","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":68,"referenced_works":["https://openalex.org/W1673923490","https://openalex.org/W1945616565","https://openalex.org/W1980276147","https://openalex.org/W2108598243","https://openalex.org/W2180612164","https://openalex.org/W2243397390","https://openalex.org/W2282821441","https://openalex.org/W2295107390","https://openalex.org/W2543927648","https://openalex.org/W2587299461","https://openalex.org/W2606462007","https://openalex.org/W2607219512","https://openalex.org/W2618043096","https://openalex.org/W2746600820","https://openalex.org/W2764024122","https://openalex.org/W2765424254","https://openalex.org/W2768346313","https://openalex.org/W2783784437","https://openalex.org/W2786118190","https://openalex.org/W2811104224","https://openalex.org/W2916845318","https://openalex.org/W2947133760","https://openalex.org/W2962759300","https://openalex.org/W2962858109","https://openalex.org/W2962883557","https://openalex.org/W2963001136","https://openalex.org/W2963081790","https://openalex.org/W2963158386","https://openalex.org/W2963495494","https://openalex.org/W2963857521","https://openalex.org/W2963920068","https://openalex.org/W2969542116","https://openalex.org/W2979997102","https://openalex.org/W2996506901","https://openalex.org/W3010924116","https://openalex.org/W3080260826","https://openalex.org/W3101609372","https://openalex.org/W3103557498","https://openalex.org/W3106412272","https://openalex.org/W3132087345","https://openalex.org/W3138986594","https://openalex.org/W3173687217","https://openalex.org/W3192911000","https://openalex.org/W3209456875","https://openalex.org/W4288313203","https://openalex.org/W4288363925","https://openalex.org/W4293846201","https://openalex.org/W4300511536","https://openalex.org/W4300677102","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6719080892","https://openalex.org/W6736207377","https://openalex.org/W6739868092","https://openalex.org/W6742162214","https://openalex.org/W6744679260","https://openalex.org/W6745272055","https://openalex.org/W6745893766","https://openalex.org/W6746402973","https://openalex.org/W6747473890","https://openalex.org/W6747819456","https://openalex.org/W6747920752","https://openalex.org/W6748711285","https://openalex.org/W6753001334","https://openalex.org/W6761100157","https://openalex.org/W6765558359","https://openalex.org/W6771955841","https://openalex.org/W6790896015"],"related_works":["https://openalex.org/W3198669681","https://openalex.org/W3046843850","https://openalex.org/W3194684016","https://openalex.org/W4386716251","https://openalex.org/W2936485314","https://openalex.org/W3003183197","https://openalex.org/W2546942002","https://openalex.org/W2970216048","https://openalex.org/W2382607599","https://openalex.org/W4293499149"],"abstract_inverted_index":{"Mitigating":[0],"adversarial":[1,31,46,50,75,97,100,121,134,154,185],"deep":[2],"learning":[3],"attacks":[4],"remains":[5],"challenging,":[6],"partly":[7],"because":[8],"of":[9,29,107,153,167,174,183],"the":[10,27,43,63,92,132,142,165,175,181],"ease":[11],"and":[12,53,56,66,123,194],"low":[13],"cost":[14],"in":[15,21,48,59,146],"carrying":[16],"out":[17],"such":[18,71],"attacks.":[19,77],"Therefore,":[20],"this":[22,170],"paper,":[23],"we":[24,39,68,84],"focus":[25],"on":[26,34,188],"understanding":[28,152],"universal":[30,133,184],"example":[32,76,186],"attack":[33,141,187],"image":[35,94,189],"classification":[36,64,125,143,158,190],"models.":[37],"Specifically,":[38],"seek":[40,80],"to":[41,73,81,89,127,140,149,178],"understand":[42],"difference(s)":[44],"between":[45],"examples":[47,58],"two":[49],"datasets":[51],"(DAmageNet":[52],"PGD":[54],"dataset)":[55],"clean":[57],"ImageNet":[60],"learned":[61],"by":[62],"model,":[65],"whether":[67,91,131],"can":[69,85,136],"use":[70],"findings":[72],"resist":[74],"We":[78,102],"also":[79],"determine":[82,130],"if":[83],"retrain":[86],"a":[87,105,150],"discriminator":[88],"discriminate":[90],"input":[93],"is":[95,172],"an":[96,161],"example,":[98],"using":[99],"training.":[101],"then":[103],"design":[104],"number":[106],"experiments":[108],"(e.g.,":[109],"class":[110],"activation":[111],"map":[112,116],"(CAM)":[113],"analysis,":[114,117],"feature":[115,118],"maps/filters":[119],"changing,":[120],"training,":[122],"binary":[124],"model)":[126],"help":[128],"us":[129],"dataset":[135],"be":[137],"successfully":[138],"used":[139],"model.":[144],"This,":[145],"turn,":[147],"contributes":[148],"better":[151],"defenses":[155],"over":[156],"pretrained":[157],"model":[159],"from":[160],"interpretation":[162,182],"perspective.":[163],"To":[164],"best":[166],"our":[168],"knowledge,":[169],"work":[171],"one":[173],"earliest":[176],"works":[177],"systematically":[179],"investigate":[180],"models,":[191],"both":[192],"visually":[193],"quantitatively.":[195]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
