{"id":"https://openalex.org/W7117257208","doi":"https://doi.org/10.1109/tifs.2025.3648551","title":"Towards Patch-Based Noise Compression for Adversarial Attack Against Transformer-Based Visual Tracking","display_name":"Towards Patch-Based Noise Compression for Adversarial Attack Against Transformer-Based Visual Tracking","publication_year":2025,"publication_date":"2025-12-25","ids":{"openalex":"https://openalex.org/W7117257208","doi":"https://doi.org/10.1109/tifs.2025.3648551"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2025.3648551","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3648551","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Peng Gao","orcid":"https://orcid.org/0000-0003-2230-3937"},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"education","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Peng Gao","raw_affiliation_strings":["School of Cyber Science and Engineering, Qufu Normal University, Qufu, Shandong, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Qufu Normal University, Qufu, Shandong, China","institution_ids":["https://openalex.org/I202126657"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121274916","display_name":"Long Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"education","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Long Xu","raw_affiliation_strings":["School of Cyber Science and Engineering, Qufu Normal University, Qufu, Shandong, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Qufu Normal University, Qufu, Shandong, China","institution_ids":["https://openalex.org/I202126657"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004776556","display_name":"Wei Tang","orcid":"https://orcid.org/0000-0001-5966-2998"},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"education","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wen-Jia Tang","raw_affiliation_strings":["School of Cyber Science and Engineering, Qufu Normal University, Qufu, Shandong, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Qufu Normal University, Qufu, Shandong, China","institution_ids":["https://openalex.org/I202126657"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121298649","display_name":"Fei Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Wang","raw_affiliation_strings":["School of Integrated Circuits, Harbin Institute of Technology Shenzhen, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"School of Integrated Circuits, Harbin Institute of Technology Shenzhen, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I158809036"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121253132","display_name":"Hamido Fujita","orcid":null},"institutions":[{"id":"https://openalex.org/I4164984","display_name":"International Islamic University Malaysia","ror":"https://ror.org/03s9hs139","country_code":"MY","type":"education","lineage":["https://openalex.org/I4164984"]},{"id":"https://openalex.org/I4210111474","display_name":"International University College Of Technology","ror":"https://ror.org/01w1er029","country_code":"MY","type":"education","lineage":["https://openalex.org/I4210111474"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Hamido Fujita","raw_affiliation_strings":["Malaysia&#x2013;Japan International Institute of Technology, University Teknologi Malaysia, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Malaysia&#x2013;Japan International Institute of Technology, University Teknologi Malaysia, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4164984","https://openalex.org/I4210111474"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121268674","display_name":"Hanan Aljuaid","orcid":null},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Hanan Aljuaid","raw_affiliation_strings":["Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025121954","display_name":"Ru-Yue Yuan","orcid":null},"institutions":[{"id":"https://openalex.org/I51185872","display_name":"Jining Medical University","ror":"https://ror.org/03zn9gq54","country_code":"CN","type":"education","lineage":["https://openalex.org/I51185872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ru-Yue Yuan","raw_affiliation_strings":["resides in Jining, Shandong, China"],"affiliations":[{"raw_affiliation_string":"resides in Jining, Shandong, China","institution_ids":["https://openalex.org/I51185872"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I202126657"],"apc_list":null,"apc_paid":null,"fwci":2.3568,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.9329554,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"21","issue":null,"first_page":"854","last_page":"869"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.00139999995008111,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.0007999999797903001,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.910099983215332},{"id":"https://openalex.org/keywords/initialization","display_name":"Initialization","score":0.5138000249862671},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.511900007724762},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.49309998750686646},{"id":"https://openalex.org/keywords/sensitivity","display_name":"Sensitivity (control systems)","score":0.47519999742507935},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.3901999890804291},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.37290000915527344}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.910099983215332},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8180999755859375},{"id":"https://openalex.org/C114466953","wikidata":"https://www.wikidata.org/wiki/Q6034165","display_name":"Initialization","level":2,"score":0.5138000249862671},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.511900007724762},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.49309998750686646},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.48730000853538513},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.47519999742507935},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.3901999890804291},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.37290000915527344},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3573000133037567},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30239999294281006},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.3012999892234802},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2955999970436096},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.28200000524520874},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.2809999883174896},{"id":"https://openalex.org/C29265498","wikidata":"https://www.wikidata.org/wiki/Q7047719","display_name":"Noise measurement","level":3,"score":0.2736999988555908},{"id":"https://openalex.org/C147764199","wikidata":"https://www.wikidata.org/wiki/Q6865248","display_name":"Minification","level":2,"score":0.2587999999523163},{"id":"https://openalex.org/C35772409","wikidata":"https://www.wikidata.org/wiki/Q1323086","display_name":"Image noise","level":3,"score":0.257099986076355}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3648551","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3648551","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6976919174194336,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G4637001341","display_name":null,"funder_award_id":"HCPNU2025R54","funder_id":"https://openalex.org/F4320322484","funder_display_name":"Princess Nourah Bint Abdulrahman University"},{"id":"https://openalex.org/G6857328452","display_name":null,"funder_award_id":"2023M732022","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G792131290","display_name":null,"funder_award_id":"2025CXGC010113","funder_id":"https://openalex.org/F4320333596","funder_display_name":"Key Technology Research and Development Program of Shandong"},{"id":"https://openalex.org/G8166403583","display_name":null,"funder_award_id":"2025CXGC010113","funder_id":"https://openalex.org/F4320330214","funder_display_name":"Key Research and Development Program of Hunan Province of China"},{"id":"https://openalex.org/G8689341711","display_name":null,"funder_award_id":"KJZD20230923115759015","funder_id":"https://openalex.org/F4320326705","funder_display_name":"Science, Technology and Innovation Commission of Shenzhen Municipality"}],"funders":[{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320322484","display_name":"Princess Nourah Bint Abdulrahman University","ror":"https://ror.org/05b0cyh02"},{"id":"https://openalex.org/F4320326705","display_name":"Science, Technology and Innovation Commission of Shenzhen Municipality","ror":null},{"id":"https://openalex.org/F4320330214","display_name":"Key Research and Development Program of Hunan Province of China","ror":null},{"id":"https://openalex.org/F4320333596","display_name":"Key Technology Research and Development Program of Shandong","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W2243397390","https://openalex.org/W2543927648","https://openalex.org/W2774644650","https://openalex.org/W2794744029","https://openalex.org/W2898200825","https://openalex.org/W2963448658","https://openalex.org/W2972986629","https://openalex.org/W3034418285","https://openalex.org/W3035677743","https://openalex.org/W3090155371","https://openalex.org/W3096609285","https://openalex.org/W3107524501","https://openalex.org/W3121523901","https://openalex.org/W3137278571","https://openalex.org/W3145185940","https://openalex.org/W3151130473","https://openalex.org/W3154326567","https://openalex.org/W3167536469","https://openalex.org/W3170378827","https://openalex.org/W3190492058","https://openalex.org/W3203857058","https://openalex.org/W3208338480","https://openalex.org/W3214586131","https://openalex.org/W4214493665","https://openalex.org/W4214634256","https://openalex.org/W4214669216","https://openalex.org/W4214759957","https://openalex.org/W4214870408","https://openalex.org/W4214893857","https://openalex.org/W4285603016","https://openalex.org/W4312323989","https://openalex.org/W4312472480","https://openalex.org/W4312532041","https://openalex.org/W4312560592","https://openalex.org/W4312651496","https://openalex.org/W4312670531","https://openalex.org/W4312751983","https://openalex.org/W4319300771","https://openalex.org/W4320036892","https://openalex.org/W4321151009","https://openalex.org/W4322576880","https://openalex.org/W4367172091","https://openalex.org/W4375869376","https://openalex.org/W4377079883","https://openalex.org/W4382467859","https://openalex.org/W4386065544","https://openalex.org/W4386066081","https://openalex.org/W4386066394","https://openalex.org/W4386066459","https://openalex.org/W4386076306","https://openalex.org/W4386083067","https://openalex.org/W4400447302","https://openalex.org/W4405517228"],"related_works":[],"abstract_inverted_index":{"In":[0,68],"recent":[1],"years,":[2],"with":[3,218],"the":[4,49,59,149,156,162,165,196,202,207,213,219,256,270],"widespread":[5],"application":[6],"of":[7,62,152,158,164,221,223,258,274],"Vision":[8],"Transformer":[9],"(ViT)":[10],"in":[11,51,66],"visual":[12,69,261],"trackers,":[13,79,87,103,173],"their":[14],"robustness":[15],"has":[16],"received":[17],"increasing":[18],"attention.":[19],"However,":[20],"by":[21,125,216],"focusing":[22],"on":[23,82,101,170],"global":[24],"interactions":[25],"between":[26,54],"image":[27],"patches,":[28,56],"ViT":[29],"reduces":[30,145],"sensitivity":[31,53,139],"to":[32,195,210],"local":[33],"noise,":[34,64,147],"posing":[35],"new":[36,265],"challenges":[37],"for":[38,237,249,267],"adversarial":[39,44,63,72,83,109,115,122,146,199,239,250,275],"attacks.":[40,276],"Meanwhile,":[41],"existing":[42,71,197,259],"decision-based":[43,89,114],"attack":[45,73,116,132,168,200,214,240],"methods":[46,74],"often":[47],"overlook":[48],"differences":[50],"noise":[52,110,123,138,153,208],"different":[55],"further":[57,268],"limiting":[58],"compression":[60,111,129],"efficiency":[61,130,271],"especially":[65],"ViT.":[67],"tracking,":[70],"primarily":[75],"target":[76],"Siamese":[77],"network-based":[78],"and":[80,131,144,178,180,188,246,263,272],"research":[81],"attacks":[84,100],"against":[85],"Transformer-based":[86,102,172,260],"particularly":[88],"black-box":[90,99],"attacks,":[91],"is":[92],"still":[93],"relatively":[94],"limited.":[95],"To":[96],"implement":[97],"effective":[98],"this":[104],"paper":[105],"innovatively":[106],"proposes":[107],"patch-based":[108],"(PANC),":[112],"a":[113,137,243],"method.":[117],"This":[118],"method":[119,169],"effectively":[120],"compresses":[121,206],"patch":[124],"patch,":[126],"significantly":[127],"improving":[128,212,269],"concealment.":[133],"PANC":[134,167,205,227],"also":[135],"introduces":[136],"matrix":[140],"that":[141,193],"dynamically":[142],"adds":[143],"optimizing":[148],"spatial":[150],"distribution":[151],"while":[154],"decreasing":[155],"number":[157,220],"queries.":[159],"We":[160],"validated":[161],"effectiveness":[163,215],"proposed":[166],"several":[171],"including":[174],"OSTrack,":[175],"STARK,":[176],"TransT,":[177],"MixformerV2,":[179],"three":[181],"public":[182],"large-scale":[183],"benchmark":[184],"datasets:":[185],"GOT-10k,":[186],"TrackingNet,":[187],"LaSOT.":[189],"Experimental":[190],"results":[191],"show":[192],"compared":[194],"state-of-the-art":[198],"method,":[201],"IoU":[203],"attack,":[204],"level":[209],"10%,":[211],"162%":[217],"queries":[222],"only":[224],"45.7%.":[225],"Furthermore,":[226],"can":[228],"serve":[229],"as":[230],"an":[231],"initialization":[232],"or":[233],"post-processing":[234],"optimization":[235],"strategy":[236],"other":[238],"methods,":[241],"providing":[242],"more":[244],"flexible":[245],"efficient":[247],"mechanism":[248],"example":[251],"generation.":[252],"Our":[253],"work":[254],"reveals":[255],"vulnerabilities":[257],"trackers":[262],"offers":[264],"ideas":[266],"concealment":[273]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-25T00:00:00"}
