{"id":"https://openalex.org/W4416706966","doi":"https://doi.org/10.1109/tdsc.2025.3637369","title":"Quantitative Frequency-Based Framework for Interpreting Adversarial Examples","display_name":"Quantitative Frequency-Based Framework for Interpreting Adversarial Examples","publication_year":2025,"publication_date":"2025-11-26","ids":{"openalex":"https://openalex.org/W4416706966","doi":"https://doi.org/10.1109/tdsc.2025.3637369"},"language":null,"primary_location":{"id":"doi:10.1109/tdsc.2025.3637369","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3637369","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010311797","display_name":"Sicong Han","orcid":"https://orcid.org/0000-0002-8459-4701"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Sicong Han","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077967584","display_name":"Chenhao Lin","orcid":"https://orcid.org/0000-0002-9327-9260"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenhao Lin","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064997871","display_name":"Chao Shen","orcid":"https://orcid.org/0000-0003-4147-4934"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Shen","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058084433","display_name":"Zhengyu Zhao","orcid":"https://orcid.org/0000-0003-0745-4294"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengyu Zhao","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058517717","display_name":"Q. X. Li","orcid":"https://orcid.org/0000-0002-8000-3695"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022732870","display_name":"Qian Wang","orcid":"https://orcid.org/0009-0001-0494-8750"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5010311797"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19973903,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"2","first_page":"3538","last_page":"3553"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.000699999975040555,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.00019999999494757503,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.9789000153541565},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.7404999732971191},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.4408000111579895},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.38269999623298645},{"id":"https://openalex.org/keywords/interpretation","display_name":"Interpretation (philosophy)","score":0.3824999928474426}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.9789000153541565},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7426999807357788},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.7404999732971191},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5390999913215637},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.4408000111579895},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.38269999623298645},{"id":"https://openalex.org/C527412718","wikidata":"https://www.wikidata.org/wiki/Q855395","display_name":"Interpretation (philosophy)","level":2,"score":0.3824999928474426},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3718000054359436},{"id":"https://openalex.org/C19118579","wikidata":"https://www.wikidata.org/wiki/Q786423","display_name":"Frequency domain","level":2,"score":0.36039999127388},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.334199994802475},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2985000014305115},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2712000012397766}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3637369","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3637369","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W2194775991","https://openalex.org/W2243397390","https://openalex.org/W2302255633","https://openalex.org/W2963446712","https://openalex.org/W2963857521","https://openalex.org/W2964137095","https://openalex.org/W3034175346","https://openalex.org/W3035467354","https://openalex.org/W3088909400","https://openalex.org/W3175786209","https://openalex.org/W3186991201","https://openalex.org/W3199692755","https://openalex.org/W3202090809","https://openalex.org/W4214870408","https://openalex.org/W4225928697","https://openalex.org/W4293846201","https://openalex.org/W4294310809","https://openalex.org/W4362607841","https://openalex.org/W4367313930","https://openalex.org/W4382119919","https://openalex.org/W4383215819","https://openalex.org/W4388905688","https://openalex.org/W4390873031","https://openalex.org/W4392091283","https://openalex.org/W4392359562","https://openalex.org/W4393154890","https://openalex.org/W4400771068","https://openalex.org/W4402716179","https://openalex.org/W4402776736","https://openalex.org/W4405304484","https://openalex.org/W4409494206"],"related_works":[],"abstract_inverted_index":{"Deep":[0],"neural":[1],"networks":[2],"are":[3,77,141],"known":[4],"to":[5,8,15,39,58,93,123,178],"be":[6],"susceptible":[7],"imperceptible":[9],"adversarial":[10,17,36,47,61,87,128,138,160,183],"perturbations.":[11],"Many":[12],"studies":[13],"aim":[14],"interpret":[16],"examples":[18,48,184],"in":[19,89,106],"the":[20,83,90,101,120,134],"frequency":[21,91,108,114,151],"domain.":[22],"However,":[23],"existing":[24],"research":[25],"often":[26],"relies":[27],"on":[28],"a":[29,43,54,179],"limited":[30],"number":[31],"of":[32,46,66,85,103,137,182],"datasets,":[33],"models,":[34],"and":[35,70,110,146,153,172,185],"attacks,":[37],"leading":[38],"incomplete":[40],"conclusions.":[41],"Moreover,":[42],"quantitative":[44,55],"interpretation":[45],"remains":[49],"lacking.":[50],"This":[51],"paper":[52],"proposes":[53],"frequency-based":[56],"framework":[57,81],"comprehensively":[59],"investigate":[60],"examples,":[62],"where":[63],"six":[64],"kinds":[65],"attacks":[67,161],"against":[68],"naturally":[69],"adversarially":[71,112],"trained":[72],"models":[73],"across":[74],"three":[75],"datasets":[76],"adopted.":[78],"Initially,":[79],"our":[80],"visualizes":[82],"distributions":[84],"successful":[86],"perturbations":[88,104],"domain":[92],"locate":[94],"their":[95,170],"target":[96],"regions.":[97],"Subsequently,":[98],"we":[99,118,156],"characterize":[100],"importance":[102],"contained":[105],"different":[107],"bands":[109,115,152],"define":[111],"effective":[113],"(AEFBs).":[116],"Furthermore,":[117],"leverage":[119],"identified":[121],"AEFBs":[122,164],"enhance":[124],"two":[125],"query-based":[126],"black-box":[127],"attacks.":[129],"Our":[130],"experimental":[131],"results":[132],"uncover":[133],"varying":[135],"characteristics":[136],"perturbations,":[139],"which":[140],"analyzed":[142],"from":[143],"dataset-level,":[144],"model-level,":[145],"attack-level":[147],"perspectives.":[148],"After":[149],"reordering":[150],"identifying":[154],"AEFBs,":[155],"further":[157],"demonstrate":[158],"that":[159],"guided":[162],"by":[163],"can":[165],"achieve":[166],"superior":[167],"performance,":[168],"verifying":[169],"effectiveness":[171],"generalization.":[173],"These":[174],"significant":[175],"findings":[176],"contribute":[177],"deeper":[180],"understanding":[181],"provide":[186],"valuable":[187],"insights":[188],"for":[189],"future":[190],"research.":[191]},"counts_by_year":[],"updated_date":"2026-03-17T06:59:57.516163","created_date":"2025-11-27T00:00:00"}
