{"id":"https://openalex.org/W4387385625","doi":"https://doi.org/10.1109/tifs.2023.3322315","title":"Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network","display_name":"Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network","publication_year":2023,"publication_date":"2023-10-05","ids":{"openalex":"https://openalex.org/W4387385625","doi":"https://doi.org/10.1109/tifs.2023.3322315"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3322315","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3322315","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030009218","display_name":"Yi Ding","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I4210131342","display_name":"Yibin University","ror":"https://ror.org/03w8m2977","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131342"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yi Ding","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","Yibin Great Technology Company Ltd., Yibin, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Yibin Great Technology Company Ltd., Yibin, China","institution_ids":["https://openalex.org/I4210131342"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100338320","display_name":"Zi Wang","orcid":"https://orcid.org/0000-0001-6596-540X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zi Wang","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100763095","display_name":"Zhen Qin","orcid":"https://orcid.org/0000-0001-7857-9719"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I4210131342","display_name":"Yibin University","ror":"https://ror.org/03w8m2977","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131342"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Qin","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","Yibin Great Technology Company Ltd., Yibin, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Yibin Great Technology Company Ltd., Yibin, China","institution_ids":["https://openalex.org/I4210131342"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033942218","display_name":"Erqiang Zhou","orcid":"https://orcid.org/0009-0009-1908-3313"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Erqiang Zhou","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058997400","display_name":"Guobin Zhu","orcid":"https://orcid.org/0000-0002-8887-1446"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guobin Zhu","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045032131","display_name":"Zhiguang Qin","orcid":"https://orcid.org/0000-0001-6745-6377"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiguang Qin","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5030009218"],"corresponding_institution_ids":["https://openalex.org/I150229711","https://openalex.org/I4210131342"],"apc_list":null,"apc_paid":null,"fwci":3.4964,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.94357486,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"19","issue":null,"first_page":"280","last_page":"292"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9600916504859924},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8437705636024475},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7658942341804504},{"id":"https://openalex.org/keywords/subnetwork","display_name":"Subnetwork","score":0.635633111000061},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.4889901876449585},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45239534974098206},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.4214785695075989},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.41448774933815},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.39635586738586426}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9600916504859924},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8437705636024475},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7658942341804504},{"id":"https://openalex.org/C2780186347","wikidata":"https://www.wikidata.org/wiki/Q11414","display_name":"Subnetwork","level":2,"score":0.635633111000061},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.4889901876449585},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45239534974098206},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.4214785695075989},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.41448774933815},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39635586738586426}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3322315","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3322315","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.6000000238418579,"display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G178373660","display_name":null,"funder_award_id":"ZYGX2022YGRH012","funder_id":"https://openalex.org/F4320323292","funder_display_name":"University of Electronic Science and Technology of China"},{"id":"https://openalex.org/G2586345122","display_name":null,"funder_award_id":"62076054","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3352946381","display_name":null,"funder_award_id":"62072074","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6084036395","display_name":null,"funder_award_id":"2021CG003","funder_id":"https://openalex.org/F4320329873","funder_display_name":"Yibin Science and Technology Bureau"},{"id":"https://openalex.org/G6829202501","display_name":null,"funder_award_id":"ZYGX2021YGLH212","funder_id":"https://openalex.org/F4320323292","funder_display_name":"University of Electronic Science and Technology of China"},{"id":"https://openalex.org/G7202444375","display_name":null,"funder_award_id":"62027827","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7568062542","display_name":null,"funder_award_id":"62002047","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320323292","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92"},{"id":"https://openalex.org/F4320329873","display_name":"Yibin Science and Technology Bureau","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1904878066","https://openalex.org/W2110727892","https://openalex.org/W2125671325","https://openalex.org/W2146763593","https://openalex.org/W2161022751","https://openalex.org/W2164736805","https://openalex.org/W2169111714","https://openalex.org/W2748789698","https://openalex.org/W2753783305","https://openalex.org/W2774423163","https://openalex.org/W2790225553","https://openalex.org/W2883233582","https://openalex.org/W2901972078","https://openalex.org/W2914132244","https://openalex.org/W2962793481","https://openalex.org/W2995271548","https://openalex.org/W2997594966","https://openalex.org/W3010216907","https://openalex.org/W3015896431","https://openalex.org/W3026554779","https://openalex.org/W3034856584","https://openalex.org/W3035671550","https://openalex.org/W3041840141","https://openalex.org/W3046108963","https://openalex.org/W3114686421","https://openalex.org/W3165540137","https://openalex.org/W3170572542","https://openalex.org/W3172704433","https://openalex.org/W3213508244","https://openalex.org/W4214680449","https://openalex.org/W4226495087","https://openalex.org/W4288636824","https://openalex.org/W4312233756","https://openalex.org/W4312280786","https://openalex.org/W4312768002","https://openalex.org/W6743581629","https://openalex.org/W6746897123","https://openalex.org/W6780120029","https://openalex.org/W6795104400"],"related_works":["https://openalex.org/W4386242069","https://openalex.org/W4224241849","https://openalex.org/W2949316140","https://openalex.org/W1565128838","https://openalex.org/W4375948682","https://openalex.org/W2407700239","https://openalex.org/W2910586303","https://openalex.org/W1881831204","https://openalex.org/W2951404390","https://openalex.org/W2120129724"],"abstract_inverted_index":{"Medical":[0],"images":[1,15],"often":[2],"contain":[3],"sensitive":[4],"information,":[5],"and":[6,19,38,65,70,78,115,185,197,230,259],"one":[7,213],"typical":[8],"security":[9,205,236,253],"measure":[10],"is":[11,68,89,92,148,161,211],"to":[12,17,53,99,131,142,151,163,218,233],"encrypt":[13],"medical":[14,35,228],"prior":[16],"storage":[18],"analysis.":[20],"A":[21],"number":[22,109],"of":[23,110,174,206,214,238],"solutions,":[24],"such":[25,195,207],"as":[26,190],"those":[27],"utilizing":[28],"deep":[29,45,225],"learning,":[30],"have":[31],"been":[32],"proposed":[33,69,247],"for":[34,63,76,167,183,194,202,256],"image":[36,159],"encryption":[37,47,64,77,84,102,184,229,258],"decryption.":[39],"However,":[40],"our":[41],"research":[42,178,200,210],"shows":[43],"that":[44,245],"learning-based":[46],"models":[48],"can":[49,118,188,249],"potentially":[50],"be":[51,119],"vulnerable":[52],"backdoor":[54,60,87,175,181,221],"attacks.":[55,176],"In":[56,104],"this":[57],"paper,":[58],"a":[59,86,108],"attack":[61,222],"paradigm":[62],"decryption":[66,79,106,134,186,231,260],"network":[67,187,232],"corresponding":[71],"attacks":[72,182],"are":[73,113],"respectively":[74],"designed":[75],"scenarios.":[80],"For":[81],"attacking":[82,155,192],"the":[83,96,101,105,116,123,127,133,137,145,154,158,172,204,215,220,224,235,246,252,257],"model,":[85],"discriminator":[88,98],"adopted,":[90],"which":[91],"randomly":[93],"trained":[94],"with":[95],"normal":[97],"confuse":[100],"process.":[103],"scenario,":[107],"subnetwork":[111,117],"parameters":[112],"replaced":[114],"activated":[120],"when":[121],"detecting":[122],"trigger":[124],"embedded":[125],"into":[126],"input":[128],"(encrypted":[129],"image)":[130],"degrade":[132],"performance.":[135,156],"Considering":[136],"model":[138,146],"performance":[139,237,254],"degradation":[140],"due":[141],"parameter":[143],"replacement,":[144],"pruning":[147],"also":[149,212],"adopted":[150,162],"further":[152],"strengthen":[153],"Furthermore,":[157],"steganography":[160],"generate":[164],"invisible":[165],"triggers":[166],"each":[168],"image;":[169],"subsequently,":[170],"improving":[171,203],"stealthiness":[173],"Our":[177],"on":[179,223],"designing":[180],"serve":[189],"an":[191],"mode":[193],"networks,":[196],"provides":[198],"another":[199],"direction":[201],"models.":[208],"This":[209],"earliest":[216],"works":[217],"realize":[219],"learning":[226],"based":[227],"evaluate":[234],"these":[239],"networks.":[240],"Extensive":[241],"experimental":[242],"results":[243],"show":[244],"method":[248],"effectively":[250],"threaten":[251],"both":[255],"network.":[261]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":13}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
