{"id":"https://openalex.org/W4408520935","doi":"https://doi.org/10.1109/tifs.2025.3552030","title":"Boosting Adversarial Transferability via Relative Feature Importance-Aware Attacks","display_name":"Boosting Adversarial Transferability via Relative Feature Importance-Aware Attacks","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4408520935","doi":"https://doi.org/10.1109/tifs.2025.3552030"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3552030","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3552030","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100410870","display_name":"Jianwei Li","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jian-Wei Li","raw_affiliation_strings":["Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology, School of Communications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","School of Communications and Information Engineering, Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology, Nanjing University of Posts and Telecommunications, Nanjing, P.R. China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology, School of Communications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"School of Communications and Information Engineering, Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology, Nanjing University of Posts and Telecommunications, Nanjing, P.R. China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101950655","display_name":"Wenze Shao","orcid":"https://orcid.org/0000-0001-6869-7789"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wen-Ze Shao","raw_affiliation_strings":["Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology, School of Communications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","School of Communications and Information Engineering, Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology, Nanjing University of Posts and Telecommunications, Nanjing, P.R. China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology, School of Communications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"School of Communications and Information Engineering, Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology, Nanjing University of Posts and Telecommunications, Nanjing, P.R. China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047679253","display_name":"Yubao Sun","orcid":"https://orcid.org/0000-0002-0462-3729"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu-Bao Sun","raw_affiliation_strings":["Engineering Research Center for Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, China","Engineering Research Center for Digital Forensics Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, P.R. China"],"affiliations":[{"raw_affiliation_string":"Engineering Research Center for Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]},{"raw_affiliation_string":"Engineering Research Center for Digital Forensics Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, P.R. China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027297951","display_name":"Li-qian Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li-Qian Wang","raw_affiliation_strings":["Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology, School of Communications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","School of Communications and Information Engineering, Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology, Nanjing University of Posts and Telecommunications, Nanjing, P.R. China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology, School of Communications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"School of Communications and Information Engineering, Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology, Nanjing University of Posts and Telecommunications, Nanjing, P.R. China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047510579","display_name":"Qi Ge","orcid":"https://orcid.org/0000-0001-6051-3017"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Ge","raw_affiliation_strings":["Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology, School of Communications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","School of Communications and Information Engineering, Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology, Nanjing University of Posts and Telecommunications, Nanjing, P.R. China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology, School of Communications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"School of Communications and Information Engineering, Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology, Nanjing University of Posts and Telecommunications, Nanjing, P.R. China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020302879","display_name":"Liang Xiao","orcid":"https://orcid.org/0000-0003-0178-9384"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Xiao","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","School of Computer Science and Engineering, NanJing, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]},{"raw_affiliation_string":"School of Computer Science and Engineering, NanJing, P.R. China","institution_ids":["https://openalex.org/I36399199"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100410870"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":2.8599,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.89930651,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"20","issue":null,"first_page":"3489","last_page":"3504"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9453999996185303,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8177684545516968},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7713019251823425},{"id":"https://openalex.org/keywords/transferability","display_name":"Transferability","score":0.7634631395339966},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.7516919374465942},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5137777924537659},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.47386956214904785},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.39294201135635376},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3855016231536865},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.361677348613739}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8177684545516968},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7713019251823425},{"id":"https://openalex.org/C61272859","wikidata":"https://www.wikidata.org/wiki/Q7834031","display_name":"Transferability","level":3,"score":0.7634631395339966},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.7516919374465942},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5137777924537659},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.47386956214904785},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39294201135635376},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3855016231536865},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.361677348613739},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C140331021","wikidata":"https://www.wikidata.org/wiki/Q1868104","display_name":"Logit","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3552030","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3552030","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.4399999976158142,"id":"https://metadata.un.org/sdg/10"}],"awards":[{"id":"https://openalex.org/G6178109681","display_name":null,"funder_award_id":"92470126","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6614652522","display_name":null,"funder_award_id":"62276139","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":71,"referenced_works":["https://openalex.org/W639708223","https://openalex.org/W2117539524","https://openalex.org/W2161969291","https://openalex.org/W2183341477","https://openalex.org/W2194775991","https://openalex.org/W2535873859","https://openalex.org/W2570343428","https://openalex.org/W2746600820","https://openalex.org/W2765424254","https://openalex.org/W2774644650","https://openalex.org/W2947874337","https://openalex.org/W2962847335","https://openalex.org/W2963446712","https://openalex.org/W2963542245","https://openalex.org/W2963726920","https://openalex.org/W2964350391","https://openalex.org/W2969542116","https://openalex.org/W2984699060","https://openalex.org/W2991496458","https://openalex.org/W2999606423","https://openalex.org/W3012430016","https://openalex.org/W3015646845","https://openalex.org/W3018757597","https://openalex.org/W3034176567","https://openalex.org/W3035253074","https://openalex.org/W3041992316","https://openalex.org/W3127807678","https://openalex.org/W3138516171","https://openalex.org/W3171288285","https://openalex.org/W3186991201","https://openalex.org/W3204155906","https://openalex.org/W3210586215","https://openalex.org/W3214186397","https://openalex.org/W4214870408","https://openalex.org/W4221140314","https://openalex.org/W4223544745","https://openalex.org/W4292794158","https://openalex.org/W4312443924","https://openalex.org/W4312790346","https://openalex.org/W4312810288","https://openalex.org/W4313141826","https://openalex.org/W4386090485","https://openalex.org/W4386299120","https://openalex.org/W4388340509","https://openalex.org/W4388726694","https://openalex.org/W4403622506","https://openalex.org/W6637373629","https://openalex.org/W6640425456","https://openalex.org/W6734194636","https://openalex.org/W6739575509","https://openalex.org/W6740483536","https://openalex.org/W6747536865","https://openalex.org/W6750227808","https://openalex.org/W6752985256","https://openalex.org/W6753468839","https://openalex.org/W6759580348","https://openalex.org/W6761372651","https://openalex.org/W6761839128","https://openalex.org/W6768366551","https://openalex.org/W6780747451","https://openalex.org/W6780913843","https://openalex.org/W6782091729","https://openalex.org/W6783600611","https://openalex.org/W6788135285","https://openalex.org/W6788457352","https://openalex.org/W6810200297","https://openalex.org/W6838510352","https://openalex.org/W6845892164","https://openalex.org/W6849726631","https://openalex.org/W6852277493","https://openalex.org/W6853649152"],"related_works":["https://openalex.org/W4288055406","https://openalex.org/W4200630034","https://openalex.org/W3137894200","https://openalex.org/W3092178728","https://openalex.org/W4226402597","https://openalex.org/W3132910851","https://openalex.org/W4377864639","https://openalex.org/W4392340763","https://openalex.org/W4283325551","https://openalex.org/W4403006689"],"abstract_inverted_index":{"Modern":[0],"deep":[1],"neural":[2],"networks":[3],"are":[4],"known":[5],"highly":[6],"vulnerable":[7],"to":[8,92,159],"adversarial":[9,93,134,187],"examples.":[10],"As":[11],"a":[12,38,52,102,109,115,130],"pioneering":[13],"work,":[14],"the":[15,81,87,96,123,127,138,143,150,154,177],"fast":[16],"gradient":[17,77],"sign":[18],"method":[19],"(FGSM)":[20],"is":[21,129,194],"proved":[22],"more":[23],"transferable":[24],"in":[25,126,153,162],"black-box":[26],"attacks":[27],"than":[28,189],"its":[29],"multi-small-step":[30],"extension,":[31],"i.e.,":[32,54],"iterative-FGSM,":[33],"particularly":[34],"being":[35],"restricted":[36],"by":[37,137],"limited":[39],"number":[40],"of":[41,79,118,133,145],"iterations.":[42],"This":[43],"paper":[44,128],"revisits":[45],"their":[46],"early,":[47],"representative":[48],"successor":[49],"MI-FGSM":[50,112],"as":[51],"baseline,":[53],"iterative-FGSM":[55],"with":[56,90],"momentum,":[57],"and":[58,173],"introduces":[59],"an":[60],"innovative":[61],"boosting":[62],"idea":[63],"different":[64],"from":[65],"either":[66],"FGSM-inspired":[67],"algorithms":[68],"or":[69],"other":[70],"mainstream":[71],"methods.":[72],"For":[73,100],"one":[74],"thing,":[75],"during":[76],"backpropogation":[78],"MI-FGSM,":[80],"proposed":[82],"approach":[83,179],"merely":[84],"requires":[85],"amending":[86],"chain":[88],"rule":[89],"respect":[91],"images":[94],"using":[95],"counterpart":[97],"original":[98],"images.":[99],"another,":[101],"credible":[103],"analysis":[104],"has":[105,183],"revealed":[106],"that":[107,176],"such":[108],"naively":[110],"boosted":[111],"essentially":[113],"performs":[114],"special":[116],"kind":[117],"intermediate-layer":[119],"attacks.":[120],"In":[121],"specific,":[122],"notable":[124],"finding":[125],"new":[131,178],"principle":[132],"transferability":[135,188],"guided":[136],"relative":[139],"feature":[140],"importance,":[141],"emphasizing":[142],"significance":[144],"semantically":[146],"non-critical":[147],"information":[148],"for":[149],"first":[151],"time":[152],"literature,":[155],"although":[156],"originally":[157],"thought":[158],"be":[160],"weak":[161],"large.":[163],"Experimental":[164],"results":[165],"on":[166],"various":[167],"leading":[168],"victim":[169],"models,":[170],"both":[171],"undefended":[172],"defended,":[174],"demonstrate":[175],"incorporating":[180],"robust":[181],"gradients":[182],"indeed":[184],"attained":[185],"stronger":[186],"state-of-the-art":[190],"works.":[191],"The":[192],"code":[193],"available":[195],"at:<uri":[196],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[197],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">https://github.com/ljwooo/RFIA-main</uri>.":[198]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
