{"id":"https://openalex.org/W4406840781","doi":"https://doi.org/10.1109/tifs.2025.3630890","title":"GreedyPixel: Fine-Grained Black-Box Adversarial Attack via Greedy Algorithm","display_name":"GreedyPixel: Fine-Grained Black-Box Adversarial Attack via Greedy Algorithm","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4406840781","doi":"https://doi.org/10.1109/tifs.2025.3630890"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3630890","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3630890","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2501.14230","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119012009","display_name":"Hanrui Wang","orcid":"https://orcid.org/0009-0005-0498-2712"},"institutions":[{"id":"https://openalex.org/I184597095","display_name":"National Institute of Informatics","ror":"https://ror.org/04ksd4g47","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1319490839","https://openalex.org/I184597095","https://openalex.org/I4210158934"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Hanrui Wang","raw_affiliation_strings":["Echizen Laboratory, National Institute of Informatics (NII), Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Echizen Laboratory, National Institute of Informatics (NII), Tokyo, Japan","institution_ids":["https://openalex.org/I184597095"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014271344","display_name":"Ching\u2010Chun Chang","orcid":"https://orcid.org/0000-0001-7723-4591"},"institutions":[{"id":"https://openalex.org/I184597095","display_name":"National Institute of Informatics","ror":"https://ror.org/04ksd4g47","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1319490839","https://openalex.org/I184597095","https://openalex.org/I4210158934"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ching-Chun Chang","raw_affiliation_strings":["Echizen Laboratory, National Institute of Informatics (NII), Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Echizen Laboratory, National Institute of Informatics (NII), Tokyo, Japan","institution_ids":["https://openalex.org/I184597095"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042784674","display_name":"Chun-Shien Lu","orcid":"https://orcid.org/0000-0002-5900-0019"},"institutions":[{"id":"https://openalex.org/I4210098366","display_name":"Institute of Information Science, Academia Sinica","ror":"https://ror.org/00z83z196","country_code":"TW","type":"facility","lineage":["https://openalex.org/I4210098366","https://openalex.org/I84653119"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chun-Shien Lu","raw_affiliation_strings":["Institute of Information Science, Academia Sinica, Taipei, Taiwan"],"affiliations":[{"raw_affiliation_string":"Institute of Information Science, Academia Sinica, Taipei, Taiwan","institution_ids":["https://openalex.org/I4210098366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076014464","display_name":"Christopher Leckie","orcid":"https://orcid.org/0000-0002-4388-0517"},"institutions":[{"id":"https://openalex.org/I165779595","display_name":"The University of Melbourne","ror":"https://ror.org/01ej9dk98","country_code":"AU","type":"education","lineage":["https://openalex.org/I165779595"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Christopher Leckie","raw_affiliation_strings":["School of Computing and Information Systems, The University of Melbourne, Parkville, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Systems, The University of Melbourne, Parkville, VIC, Australia","institution_ids":["https://openalex.org/I165779595"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044556342","display_name":"Isao Echizen","orcid":"https://orcid.org/0000-0003-4908-1860"},"institutions":[{"id":"https://openalex.org/I184597095","display_name":"National Institute of Informatics","ror":"https://ror.org/04ksd4g47","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1319490839","https://openalex.org/I184597095","https://openalex.org/I4210158934"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Isao Echizen","raw_affiliation_strings":["Echizen Laboratory, National Institute of Informatics (NII), Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Echizen Laboratory, National Institute of Informatics (NII), Tokyo, Japan","institution_ids":["https://openalex.org/I184597095"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5119012009"],"corresponding_institution_ids":["https://openalex.org/I184597095"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00533502,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"12080","last_page":"12095"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9531999826431274,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7370386123657227},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.7167409062385559},{"id":"https://openalex.org/keywords/greedy-algorithm","display_name":"Greedy algorithm","score":0.6950706839561462},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6857836246490479},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5150322914123535},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21187254786491394}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7370386123657227},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.7167409062385559},{"id":"https://openalex.org/C51823790","wikidata":"https://www.wikidata.org/wiki/Q504353","display_name":"Greedy algorithm","level":2,"score":0.6950706839561462},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6857836246490479},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5150322914123535},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21187254786491394}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tifs.2025.3630890","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3630890","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2501.14230","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2501.14230","pdf_url":"https://arxiv.org/pdf/2501.14230","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2501.14230","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2501.14230","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2501.14230","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2501.14230","pdf_url":"https://arxiv.org/pdf/2501.14230","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1069223013","display_name":null,"funder_award_id":"JSPS KAKENHI","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G1878363893","display_name":"Cyber Vaccine: Core Technologies to Counter Cyber Threats with Generative AI","funder_award_id":"24H00732","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G2244060857","display_name":null,"funder_award_id":"JPMJCR20D3","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G2792802287","display_name":null,"funder_award_id":"KAKENHI","funder_id":"https://openalex.org/F4320338075","funder_display_name":"Core Research for Evolutional Science and Technology"},{"id":"https://openalex.org/G2867598600","display_name":null,"funder_award_id":"JP21H04907","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G3282004645","display_name":null,"funder_award_id":"JPMJCR","funder_id":"https://openalex.org/F4320338075","funder_display_name":"Core Research for Evolutional Science and Technology"},{"id":"https://openalex.org/G3459562248","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G3591068558","display_name":null,"funder_award_id":"JPMJCR24U3","funder_id":"https://openalex.org/F4320334789","funder_display_name":"Japan Science and Technology Agency"},{"id":"https://openalex.org/G4020452945","display_name":null,"funder_award_id":"JP24H00732","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G4103450965","display_name":"Research on master biometric information protection and utilization platform","funder_award_id":"21H04907","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G4636223006","display_name":null,"funder_award_id":"JSPS KAK","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G4826929572","display_name":null,"funder_award_id":"JPMJCR2562","funder_id":"https://openalex.org/F4320334789","funder_display_name":"Japan Science and Technology Agency"},{"id":"https://openalex.org/G6718509927","display_name":null,"funder_award_id":"CREST","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G7399311858","display_name":null,"funder_award_id":"JPMJKP24C2","funder_id":"https://openalex.org/F4320334789","funder_display_name":"Japan Science and Technology Agency"},{"id":"https://openalex.org/G7752643416","display_name":null,"funder_award_id":"Japan","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G8405342414","display_name":null,"funder_award_id":"JPMJCR20D3","funder_id":"https://openalex.org/F4320338075","funder_display_name":"Core Research for Evolutional Science and Technology"},{"id":"https://openalex.org/G8963049961","display_name":null,"funder_award_id":"JPMJCR20D3","funder_id":"https://openalex.org/F4320334789","funder_display_name":"Japan Science and Technology Agency"}],"funders":[{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"},{"id":"https://openalex.org/F4320334789","display_name":"Japan Science and Technology Agency","ror":"https://ror.org/00097mb19"},{"id":"https://openalex.org/F4320338075","display_name":"Core Research for Evolutional Science and Technology","ror":"https://ror.org/00097mb19"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2899084033","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W2748952813","https://openalex.org/W1531601525","https://openalex.org/W3009622996"],"abstract_inverted_index":{"Deep":[0],"neural":[1,144],"networks":[2,145],"are":[3,10],"highly":[4],"vulnerable":[5],"to":[6,120],"adversarial":[7,20],"examples,":[8],"which":[9],"inputs":[11],"with":[12,155],"small,":[13],"carefully":[14],"crafted":[15],"perturbations":[16],"that":[17,82],"cause":[18],"misclassification\u2014making":[19],"attacks":[21,40,56],"a":[22,33,77,92,121],"critical":[23],"tool":[24],"for":[25],"evaluating":[26],"robustness.":[27],"Existing":[28],"black-box":[29,79,164],"methods":[30],"typically":[31],"entail":[32],"trade-off":[34],"between":[35,163],"precision":[36,129],"and":[37,68,96,118,130,133,139,147,166],"flexibility:":[38],"pixel-sparse":[39],"(e.g.,":[41],"single-":[42],"or":[43,54,59],"few-pixel":[44],"attacks)":[45],"provide":[46],"fine-grained":[47,78],"control":[48],"but":[49,61],"lack":[50],"adaptability,":[51],"whereas":[52],"patch-":[53],"frequency-based":[55],"improve":[57],"efficiency":[58],"transferability,":[60],"at":[62,173],"the":[63,137,161],"cost":[64],"of":[65,100],"producing":[66],"larger":[67],"less":[69],"precise":[70],"perturbations.":[71],"We":[72],"present":[73],"<italic":[74,84,108],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[75,85,109],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">GreedyPixel</i>,":[76],"attack":[80],"method":[81],"performs":[83],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">brute-force-style,":[86],"per-pixel":[87],"greedy":[88],"optimization</i>":[89],"guided":[90],"by":[91,98],"surrogate-derived":[93],"priority":[94],"map":[95],"refined":[97],"means":[99],"query":[101],"feedback.":[102],"It":[103],"evaluates":[104],"each":[105],"coordinate":[106],"directly":[107],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">without":[110],"any":[111],"gradient":[112],"information</i>,":[113],"guaranteeing":[114],"monotonic":[115],"loss":[116],"reduction":[117],"convergence":[119],"coordinate-wise":[122],"optimum,":[123],"while":[124],"also":[125],"yielding":[126],"near":[127],"white-box-level":[128],"pixel-wise":[131],"sparsity":[132],"perceptual":[134],"quality.":[135],"On":[136],"CIFAR-10":[138],"ImageNet":[140],"datasets,":[141],"spanning":[142],"convolutional":[143],"(CNNs)":[146],"Transformer":[148],"models,":[149],"GreedyPixel":[150],"achieved":[151],"state-of-the-art":[152],"success":[153],"rates":[154],"visually":[156],"imperceptible":[157],"perturbations,":[158],"effectively":[159],"bridging":[160],"gap":[162],"practicality":[165],"white-box":[167],"performance.":[168],"The":[169],"implementation":[170],"is":[171],"available":[172],"https://github.com/azrealwang/greedypixel.":[174]},"counts_by_year":[],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-01-28T00:00:00"}
