{"id":"https://openalex.org/W7125581884","doi":"https://doi.org/10.1109/tifs.2026.3657036","title":"CAA: Toward Camouflaged and Transferable Adversarial Examples","display_name":"CAA: Toward Camouflaged and Transferable Adversarial Examples","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7125581884","doi":"https://doi.org/10.1109/tifs.2026.3657036"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2026.3657036","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3657036","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083449533","display_name":"Yipeng Zou","orcid":null},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yipeng Zou","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Qin Liu","orcid":"https://orcid.org/0000-0003-0236-4513"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qin Liu","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123729120","display_name":"Jie Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]},{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Wu","raw_affiliation_strings":["China Telecom Cloud Computing Research Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"China Telecom Cloud Computing Research Institute, Beijing, China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123753986","display_name":"Tian Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I25254941","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35","country_code":"CN","type":"education","lineage":["https://openalex.org/I25254941"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tian Wang","raw_affiliation_strings":["Institute of Artificial Intelligence and Future Networks, Beijing Normal University and UIC, Zhuhai, China"],"affiliations":[{"raw_affiliation_string":"Institute of Artificial Intelligence and Future Networks, Beijing Normal University and UIC, Zhuhai, China","institution_ids":["https://openalex.org/I25254941"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Guo Chen","orcid":"https://orcid.org/0000-0002-6069-6869"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guo Chen","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123743249","display_name":"Tao Peng","orcid":null},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Peng","raw_affiliation_strings":["School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"last","author":{"id":null,"display_name":"Guojun Wang","orcid":"https://orcid.org/0000-0002-9815-749X"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guojun Wang","raw_affiliation_strings":["School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5083449533"],"corresponding_institution_ids":["https://openalex.org/I16609230"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17900331,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"1393","last_page":"1408"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.6043999791145325,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.6043999791145325,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.18080000579357147,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11105","display_name":"Advanced Image Processing Techniques","score":0.03240000084042549,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.840499997138977},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.602400004863739},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5974000096321106},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.5770000219345093},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.44350001215934753},{"id":"https://openalex.org/keywords/camouflage","display_name":"Camouflage","score":0.4383000135421753},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4343999922275543},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4255000054836273}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8628000020980835},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.840499997138977},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7014999985694885},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.602400004863739},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5974000096321106},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.5770000219345093},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.44350001215934753},{"id":"https://openalex.org/C2776196576","wikidata":"https://www.wikidata.org/wiki/Q196113","display_name":"Camouflage","level":2,"score":0.4383000135421753},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4343999922275543},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4255000054836273},{"id":"https://openalex.org/C2779757391","wikidata":"https://www.wikidata.org/wiki/Q6002292","display_name":"Image translation","level":3,"score":0.4194999933242798},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4115000069141388},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3781000077724457},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.36090001463890076},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3528999984264374},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3427000045776367},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3197000026702881},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.31859999895095825},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.31459999084472656},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.265500009059906},{"id":"https://openalex.org/C171268870","wikidata":"https://www.wikidata.org/wiki/Q1486676","display_name":"GRASP","level":2,"score":0.2565999925136566},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.2563999891281128},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.25029999017715454}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2026.3657036","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3657036","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1199340970","display_name":null,"funder_award_id":"62272150","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3921661463","display_name":null,"funder_award_id":"62472113","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3995363970","display_name":null,"funder_award_id":"2023A1515012358","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"},{"id":"https://openalex.org/G6404655336","display_name":null,"funder_award_id":"62372121","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6704978546","display_name":null,"funder_award_id":"62222204","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321921","display_name":"Natural Science Foundation of Guangdong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W2096733369","https://openalex.org/W2138621090","https://openalex.org/W2183341477","https://openalex.org/W2194775991","https://openalex.org/W2324440847","https://openalex.org/W2607219512","https://openalex.org/W2774018344","https://openalex.org/W2774644650","https://openalex.org/W2890304135","https://openalex.org/W2962847335","https://openalex.org/W2962858109","https://openalex.org/W2963384482","https://openalex.org/W2963446712","https://openalex.org/W2964350391","https://openalex.org/W2965496811","https://openalex.org/W2969542116","https://openalex.org/W2990945337","https://openalex.org/W3012412627","https://openalex.org/W3034176567","https://openalex.org/W3034190247","https://openalex.org/W3035447895","https://openalex.org/W3138516171","https://openalex.org/W3166932403","https://openalex.org/W3179869055","https://openalex.org/W3188362651","https://openalex.org/W3193750732","https://openalex.org/W3202281277","https://openalex.org/W3204155906","https://openalex.org/W4200635057","https://openalex.org/W4214588794","https://openalex.org/W4214669216","https://openalex.org/W4225928697","https://openalex.org/W4312648479","https://openalex.org/W4320013936","https://openalex.org/W4386065604","https://openalex.org/W4387623946","https://openalex.org/W4390097598","https://openalex.org/W4390754619","https://openalex.org/W4393156324","https://openalex.org/W4393160907","https://openalex.org/W4394717653","https://openalex.org/W4399450105","https://openalex.org/W4400771068","https://openalex.org/W4402264250","https://openalex.org/W4402727751","https://openalex.org/W4402754002","https://openalex.org/W4403422358","https://openalex.org/W4408592180","https://openalex.org/W4410204244","https://openalex.org/W4413147467","https://openalex.org/W4414230226","https://openalex.org/W4415796324","https://openalex.org/W4415797536"],"related_works":[],"abstract_inverted_index":{"Transferable":[0],"adversarial":[1,39,66,72,86,172,227],"examples":[2,73],"(AEs)":[3],"are":[4,116,163],"visually":[5,117],"indistinguishable":[6,120],"from":[7,24,121],"benign":[8,25,49,122],"images,":[9],"but":[10,126],"can":[11],"successfully":[12],"mislead":[13],"unknown":[14],"deep":[15],"neural":[16],"networks.":[17],"However,":[18],"existing":[19],"AEs":[20,45,131],"normally":[21],"vary":[22],"considerably":[23],"images":[26,50,123],"in":[27],"the":[28,76,92,97,148,157,165,180,196,207,215,225],"feature":[29,189],"space,":[30],"making":[31],"them":[32],"hard":[33],"to":[34,43,83,178,194],"pass":[35],"label":[36],"checking":[37],"and":[38,108,118,144,150,191],"detection.":[40],"Therefore,":[41],"how":[42],"make":[44,84],"camouflaged,":[46],"disguising":[47],"as":[48,147],"during":[51],"detection":[52],"is":[53,82],"still":[54],"an":[55],"open":[56],"problem.":[57],"In":[58],"this":[59,101],"paper,":[60],"we":[61,103,136],"propose":[62,151],"a":[63,152,169],"novel":[64],"camouflaged":[65,71],"attack":[67,183,228],"(CAA),":[68],"which":[69],"produces":[70],"(CAEs)":[74],"for":[75,212],"first":[77,166],"time.":[78],"Our":[79],"main":[80],"idea":[81],"CAEs\u2019":[85],"properties":[87],"keep":[88],"\u201cdormant\u201d":[89],"state":[90],"until":[91],"target":[93,161],"model":[94],"inadvertently":[95],"triggers":[96],"\u201cactivated\u201d":[98],"state.":[99],"To":[100],"end,":[102],"craft":[104],"<italic":[105,109],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[106,110],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">attack</i>":[107],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">camouflage</i>":[111],"perturbations,":[112],"so":[113],"that":[114],"CAEs":[115],"feature/label-wise":[119],"at":[124],"first,":[125],"will":[127],"implicitly":[128],"turn":[129],"into":[130],"once":[132],"being":[133],"triggered.":[134],"Specifically,":[135],"exploit":[137],"two":[138],"common":[139],"preprocessing":[140,158,220],"operations,":[141],"image":[142],"scaling":[143],"JPEG":[145],"compression,":[146],"trigger,":[149],"two-stage":[153],"optimization":[154],"strategy.":[155],"As":[156],"details":[159],"of":[160,182,198,209],"models":[162],"unknown,":[164],"stage":[167,187],"trains":[168],"well-designed":[170],"generative":[171],"network":[173],"under":[174],"varying":[175],"scaling/compression":[176],"parameters":[177],"enhance":[179],"robustness":[181],"perturbations.":[184,200],"The":[185],"second":[186],"uses":[188],"(dis)similarities":[190],"contrastive":[192],"distances":[193],"improve":[195],"transferability":[197],"camouflage":[199],"Extensive":[201],"experiments":[202],"on":[203],"ImageNet":[204],"dataset":[205],"validate":[206],"effectiveness":[208],"CAA.":[210],"Especially":[211],"robust":[213],"models,":[214],"average":[216],"fooling":[217],"rate":[218],"after":[219],"could":[221],"reach":[222],"96.3%":[223],"outperforming":[224],"state-of-the-art":[226],"by":[229],"13.5%.":[230]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-25T00:00:00"}
