{"id":"https://openalex.org/W2985020889","doi":"https://doi.org/10.1109/tii.2019.2951766","title":"DeSVig: Decentralized Swift Vigilance Against Adversarial Attacks in Industrial Artificial Intelligence Systems","display_name":"DeSVig: Decentralized Swift Vigilance Against Adversarial Attacks in Industrial Artificial Intelligence Systems","publication_year":2019,"publication_date":"2019-11-06","ids":{"openalex":"https://openalex.org/W2985020889","doi":"https://doi.org/10.1109/tii.2019.2951766","mag":"2985020889"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2019.2951766","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2019.2951766","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://muroran-it.repo.nii.ac.jp/records/10381","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007267530","display_name":"Gaolei Li","orcid":"https://orcid.org/0000-0003-3913-5001"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I41725924","display_name":"Muroran Institute of Technology","ror":"https://ror.org/04rymkk69","country_code":"JP","type":"education","lineage":["https://openalex.org/I41725924"]}],"countries":["CN","JP"],"is_corresponding":true,"raw_author_name":"Gaolei Li","raw_affiliation_strings":["School of Cyber Security and the Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Shanghai Jiao Tong University, Shanghai, China","the Muroran Institution of Technology, Muroran, Japan"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security and the Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"the Muroran Institution of Technology, Muroran, Japan","institution_ids":["https://openalex.org/I41725924"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106707877","display_name":"Kaoru Ota","orcid":"https://orcid.org/0000-0002-3382-1652"},"institutions":[{"id":"https://openalex.org/I41725924","display_name":"Muroran Institute of Technology","ror":"https://ror.org/04rymkk69","country_code":"JP","type":"education","lineage":["https://openalex.org/I41725924"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kaoru Ota","raw_affiliation_strings":["Muroran Institute of Technology, Muroran, Japan"],"affiliations":[{"raw_affiliation_string":"Muroran Institute of Technology, Muroran, Japan","institution_ids":["https://openalex.org/I41725924"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061453937","display_name":"Mianxiong Dong","orcid":"https://orcid.org/0000-0002-2788-3451"},"institutions":[{"id":"https://openalex.org/I41725924","display_name":"Muroran Institute of Technology","ror":"https://ror.org/04rymkk69","country_code":"JP","type":"education","lineage":["https://openalex.org/I41725924"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Mianxiong Dong","raw_affiliation_strings":["Muroran Institute of Technology, Muroran, Japan"],"affiliations":[{"raw_affiliation_string":"Muroran Institute of Technology, Muroran, Japan","institution_ids":["https://openalex.org/I41725924"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004673608","display_name":"Jun Wu","orcid":"https://orcid.org/0000-0003-2483-6980"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Wu","raw_affiliation_strings":["School of Cyber Security and the Shanghai Key Laboratory of Integrated Adminstration Techologies for Information Security, Shanghai\u00a0Jiao\u00a0Tong\u00a0University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security and the Shanghai Key Laboratory of Integrated Adminstration Techologies for Information Security, Shanghai\u00a0Jiao\u00a0Tong\u00a0University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100391361","display_name":"Jianhua Li","orcid":"https://orcid.org/0000-0002-6831-3973"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianhua Li","raw_affiliation_strings":["School of Cyber Security and the Shanghai Key Laboratory of Integrated Adminstration Techologies for Information Security, Shanghai\u00a0Jiao\u00a0Tong\u00a0University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security and the Shanghai Key Laboratory of Integrated Adminstration Techologies for Information Security, Shanghai\u00a0Jiao\u00a0Tong\u00a0University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5007267530"],"corresponding_institution_ids":["https://openalex.org/I183067930","https://openalex.org/I41725924"],"apc_list":null,"apc_paid":null,"fwci":5.0569,"has_fulltext":false,"cited_by_count":65,"citation_normalized_percentile":{"value":0.96297261,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"16","issue":"5","first_page":"3267","last_page":"3277"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.9484832882881165},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7086158394813538},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6060472726821899},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6017617583274841},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5466353297233582},{"id":"https://openalex.org/keywords/swift","display_name":"Swift","score":0.5386177897453308},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.47855526208877563},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.47302722930908203},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44096148014068604},{"id":"https://openalex.org/keywords/vigilance","display_name":"Vigilance (psychology)","score":0.4188550114631653},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.38255494832992554},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3749721646308899},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35327303409576416}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.9484832882881165},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7086158394813538},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6060472726821899},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6017617583274841},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5466353297233582},{"id":"https://openalex.org/C116188536","wikidata":"https://www.wikidata.org/wiki/Q17118377","display_name":"Swift","level":2,"score":0.5386177897453308},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.47855526208877563},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.47302722930908203},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44096148014068604},{"id":"https://openalex.org/C192769605","wikidata":"https://www.wikidata.org/wiki/Q1418914","display_name":"Vigilance (psychology)","level":2,"score":0.4188550114631653},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.38255494832992554},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3749721646308899},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35327303409576416},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tii.2019.2951766","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2019.2951766","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},{"id":"pmh:oai:irdb.nii.ac.jp:01177:0004728583","is_oa":true,"landing_page_url":"https://muroran-it.repo.nii.ac.jp/records/10381","pdf_url":null,"source":{"id":"https://openalex.org/S7407056385","display_name":"Institutional Repositories DataBase (IRDB)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I184597095","host_organization_name":"National Institute of Informatics","host_organization_lineage":["https://openalex.org/I184597095"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS","raw_type":"journal article"},{"id":"pmh:oai:muroran-it.repo.nii.ac.jp:00010381","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400524","display_name":"Muroran Institute of Technology Academic Resources Archieve (Muroran Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I41725924","host_organization_name":"Muroran Institute of Technology","host_organization_lineage":["https://openalex.org/I41725924"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"AM"}],"best_oa_location":{"id":"pmh:oai:irdb.nii.ac.jp:01177:0004728583","is_oa":true,"landing_page_url":"https://muroran-it.repo.nii.ac.jp/records/10381","pdf_url":null,"source":{"id":"https://openalex.org/S7407056385","display_name":"Institutional Repositories DataBase (IRDB)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I184597095","host_organization_name":"National Institute of Informatics","host_organization_lineage":["https://openalex.org/I184597095"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS","raw_type":"journal article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G164061986","display_name":null,"funder_award_id":"61972255","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327368","display_name":"KDDI Foundation","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":58,"referenced_works":["https://openalex.org/W1673923490","https://openalex.org/W1945616565","https://openalex.org/W2147118406","https://openalex.org/W2243397390","https://openalex.org/W2284973007","https://openalex.org/W2294511912","https://openalex.org/W2460937040","https://openalex.org/W2585425668","https://openalex.org/W2734904907","https://openalex.org/W2755200181","https://openalex.org/W2772592650","https://openalex.org/W2777934020","https://openalex.org/W2782812883","https://openalex.org/W2786163515","https://openalex.org/W2790979755","https://openalex.org/W2792202556","https://openalex.org/W2793925626","https://openalex.org/W2794785996","https://openalex.org/W2808560727","https://openalex.org/W2821911925","https://openalex.org/W2885625512","https://openalex.org/W2886374543","https://openalex.org/W2890143438","https://openalex.org/W2891706676","https://openalex.org/W2900478463","https://openalex.org/W2905311601","https://openalex.org/W2914434280","https://openalex.org/W2920270483","https://openalex.org/W2920826579","https://openalex.org/W2923086750","https://openalex.org/W2934927394","https://openalex.org/W2962700793","https://openalex.org/W2962788286","https://openalex.org/W2962883549","https://openalex.org/W2962933288","https://openalex.org/W2962964572","https://openalex.org/W2963143631","https://openalex.org/W2963178695","https://openalex.org/W2963207607","https://openalex.org/W2963626025","https://openalex.org/W2963626858","https://openalex.org/W2963952467","https://openalex.org/W2964153729","https://openalex.org/W2964197269","https://openalex.org/W2983044655","https://openalex.org/W2996332730","https://openalex.org/W3122751563","https://openalex.org/W3187541268","https://openalex.org/W4243194682","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6719080892","https://openalex.org/W6748204703","https://openalex.org/W6748277150","https://openalex.org/W6748475379","https://openalex.org/W6750012832","https://openalex.org/W6753488111","https://openalex.org/W6756444929"],"related_works":["https://openalex.org/W2950183588","https://openalex.org/W3080754722","https://openalex.org/W3093978547","https://openalex.org/W2953536436","https://openalex.org/W3203790781","https://openalex.org/W4313346231","https://openalex.org/W2738001131","https://openalex.org/W4285785480","https://openalex.org/W2997056298","https://openalex.org/W4298079292"],"abstract_inverted_index":{"Individually":[0],"reinforcing":[1],"the":[2,47,60,70,103,140],"robustness":[3],"of":[4,62,94,106,125],"a":[5,26,50],"single":[6],"deep":[7],"learning":[8],"model":[9],"only":[10],"gives":[11],"limited":[12],"security":[13],"guarantees":[14],"especially":[15],"when":[16],"facing":[17],"adversarial":[18,33,88,110,123],"examples.":[19],"In":[20,120],"this":[21],"article,":[22],"we":[23],"propose":[24],"DeSVig,":[25],"decentralized":[27],"swift":[28],"vigilance":[29],"framework":[30],"to":[31,45,68],"identify":[32],"attacks":[34],"in":[35,49,78],"an":[36],"industrial":[37,126],"artificial":[38],"intelligence":[39],"systems":[40],"(IAISs),":[41],"which":[42,58,112],"enables":[43],"IAISs":[44],"correct":[46],"mistake":[48],"few":[51],"seconds.":[52],"The":[53,90],"DeSVig":[54,141],"is":[55,97,113,142],"highly":[56],"decentralized,":[57],"improves":[59],"effectiveness":[61],"recognizing":[63],"abnormal":[64],"inputs.":[65],"We":[66],"try":[67],"overcome":[69],"challenges":[71],"on":[72],"ultralow":[73],"latency":[74],"caused":[75],"by":[76,109,131],"dynamics":[77],"industries":[79],"using":[80],"peculiarly":[81],"designated":[82],"mobile":[83],"edge":[84],"computing":[85],"and":[86,117,146],"generative":[87],"networks.":[89],"most":[91],"important":[92],"advantage":[93],"our":[95,121],"work":[96],"that":[98,139],"it":[99],"can":[100],"significantly":[101],"reduce":[102],"failure":[104],"risks":[105],"being":[107],"deceived":[108],"examples,":[111],"critical":[114],"for":[115],"safety-prioritized":[116],"delay-sensitive":[118],"environments.":[119],"experiments,":[122],"examples":[124],"electronic":[127],"components":[128],"are":[129],"generated":[130],"several":[132],"classical":[133],"attacking":[134],"models.":[135],"Experimental":[136],"results":[137],"demonstrate":[138],"more":[143],"robust,":[144],"efficient,":[145],"scalable":[147],"than":[148],"some":[149],"state-of-art":[150],"defenses.":[151]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":12},{"year":2021,"cited_by_count":16},{"year":2020,"cited_by_count":7}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
