{"id":"https://openalex.org/W3095125464","doi":"https://doi.org/10.1137/19m1296070","title":"Active Subspace of Neural Networks: Structural Analysis and Universal Attacks","display_name":"Active Subspace of Neural Networks: Structural Analysis and Universal Attacks","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3095125464","doi":"https://doi.org/10.1137/19m1296070","mag":"3095125464"},"language":"en","primary_location":{"id":"doi:10.1137/19m1296070","is_oa":true,"landing_page_url":"https://doi.org/10.1137/19m1296070","pdf_url":null,"source":{"id":"https://openalex.org/S4210229561","display_name":"SIAM Journal on Mathematics of Data Science","issn_l":"2577-0187","issn":["2577-0187"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320508","host_organization_name":"Society for Industrial and Applied Mathematics","host_organization_lineage":["https://openalex.org/P4310320508"],"host_organization_lineage_names":["Society for Industrial and Applied Mathematics"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SIAM Journal on Mathematics of Data Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1137/19m1296070","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057257613","display_name":"Chunfeng Cui","orcid":"https://orcid.org/0000-0002-6815-4060"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Chunfeng Cui","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0000-0002-6815-4060","affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101894184","display_name":"Kaiqi Zhang","orcid":"https://orcid.org/0000-0003-4097-4750"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kaiqi Zhang","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089514904","display_name":"Talgat Daulbaev","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Talgat Daulbaev","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034056852","display_name":"Julia Gusak","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Julia Gusak","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004111307","display_name":"Ivan Oseledets","orcid":"https://orcid.org/0000-0003-2071-2163"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ivan Oseledets","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5100459168","display_name":"Zheng Zhang","orcid":"https://orcid.org/0000-0003-1470-6998"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zheng Zhang","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5057257613"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.4461,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.91376237,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"2","issue":"4","first_page":"1096","last_page":"1122"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10928","display_name":"Probabilistic and Robust Engineering Design","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11948","display_name":"Machine Learning in Materials Science","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/subspace-topology","display_name":"Subspace topology","score":0.8841428160667419},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6739945411682129},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6739402413368225},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5386438369750977},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.5363985300064087},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.48448869585990906},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.46400657296180725},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4297425150871277},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.40351155400276184},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3394310772418976},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.265114426612854},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19253328442573547},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10440924763679504}],"concepts":[{"id":"https://openalex.org/C32834561","wikidata":"https://www.wikidata.org/wiki/Q660730","display_name":"Subspace topology","level":2,"score":0.8841428160667419},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6739945411682129},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6739402413368225},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5386438369750977},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.5363985300064087},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.48448869585990906},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.46400657296180725},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4297425150871277},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.40351155400276184},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3394310772418976},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.265114426612854},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19253328442573547},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10440924763679504},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1137/19m1296070","is_oa":true,"landing_page_url":"https://doi.org/10.1137/19m1296070","pdf_url":null,"source":{"id":"https://openalex.org/S4210229561","display_name":"SIAM Journal on Mathematics of Data Science","issn_l":"2577-0187","issn":["2577-0187"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320508","host_organization_name":"Society for Industrial and Applied Mathematics","host_organization_lineage":["https://openalex.org/P4310320508"],"host_organization_lineage_names":["Society for Industrial and Applied Mathematics"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SIAM Journal on Mathematics of Data Science","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1137/19m1296070","is_oa":true,"landing_page_url":"https://doi.org/10.1137/19m1296070","pdf_url":null,"source":{"id":"https://openalex.org/S4210229561","display_name":"SIAM Journal on Mathematics of Data Science","issn_l":"2577-0187","issn":["2577-0187"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320508","host_organization_name":"Society for Industrial and Applied Mathematics","host_organization_lineage":["https://openalex.org/P4310320508"],"host_organization_lineage_names":["Society for Industrial and Applied Mathematics"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SIAM Journal on Mathematics of Data Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6349798659","display_name":null,"funder_award_id":"14.756.31.0001","funder_id":"https://openalex.org/F4320321912","funder_display_name":"Ministry of Education and Science of the Russian Federation"}],"funders":[{"id":"https://openalex.org/F4320321912","display_name":"Ministry of Education and Science of the Russian Federation","ror":"https://ror.org/00ghqgy32"},{"id":"https://openalex.org/F4320332500","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W135841311","https://openalex.org/W1485437584","https://openalex.org/W1612404967","https://openalex.org/W1798945469","https://openalex.org/W1973734200","https://openalex.org/W1973948212","https://openalex.org/W2018159038","https://openalex.org/W2053469438","https://openalex.org/W2058641082","https://openalex.org/W2113517083","https://openalex.org/W2117756735","https://openalex.org/W2118163005","https://openalex.org/W2118545728","https://openalex.org/W2127141656","https://openalex.org/W2148694408","https://openalex.org/W2180612164","https://openalex.org/W2243397390","https://openalex.org/W2460144244","https://openalex.org/W2516574342","https://openalex.org/W2768718880","https://openalex.org/W2884001105","https://openalex.org/W2917779306","https://openalex.org/W2949941638","https://openalex.org/W2953047670","https://openalex.org/W2955934858","https://openalex.org/W2962864096","https://openalex.org/W2962939807","https://openalex.org/W2962963202","https://openalex.org/W2963809642","https://openalex.org/W3021189130","https://openalex.org/W3103869760","https://openalex.org/W4236965008"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W4224009465","https://openalex.org/W4286629047","https://openalex.org/W4306321456","https://openalex.org/W4285260836","https://openalex.org/W2042327336","https://openalex.org/W2543161807","https://openalex.org/W2321141263"],"abstract_inverted_index":{"Active":[0],"subspace":[1,37,104,140],"is":[2],"a":[3,76,99,116,119],"model":[4,90],"reduction":[5],"method":[6],"widely":[7],"used":[8],"in":[9,155],"the":[10,20,35,40,52,70,96,152],"uncertainty":[11],"quantification":[12],"community.":[13],"In":[14],"this":[15,163],"paper,":[16],"we":[17,33,93],"propose":[18,94],"analyzing":[19,95],"internal":[21],"structure":[22,72],"and":[23,73,78,133],"vulnerability":[24,97],"of":[25,42,54,98],"deep":[26],"neural":[27,100],"networks":[28],"using":[29,102],"active":[30,36,103,139],"subspace.":[31],"Firstly,":[32],"employ":[34],"to":[38,62,68,74,83],"measure":[39],"number":[41,53],"\u201cactive":[43],"neurons\u201d":[44],"at":[45],"each":[46],"intermediate":[47],"layer,":[48],"which":[49],"indicates":[50],"that":[51,86,113,127],"neurons":[55],"can":[56,114,129,143],"be":[57],"reduced":[58],"from":[59],"several":[60,63],"thousands":[61],"dozens.":[64],"This":[65],"motivates":[66],"us":[67],"change":[69],"network":[71,101],"develop":[75],"new":[77],"more":[79],"compact":[80],"network,":[81],"referred":[82],"as":[84],"ASNet,":[85],"has":[87],"significantly":[88],"fewer":[89],"parameters.":[91],"Secondly,":[92],"by":[105],"finding":[106],"an":[107],"additive":[108],"universal":[109,138],"adversarial":[110],"attack":[111,141,148],"vector":[112,142],"misclassify":[115],"dataset":[117],"with":[118,151],"high":[120],"probability.":[121],"Our":[122],"experiments":[123],"on":[124],"CIFAR-10":[125],"show":[126],"ASNet":[128],"achieve":[130,144],"23.98x":[131],"parameter":[132],"7.30x":[134],"flops":[135],"reduction.":[136],"The":[137,159],"around":[145],"20%":[146],"higher":[147],"ratio":[149],"compared":[150],"existing":[153],"approaches":[154],"our":[156],"numerical":[157],"experiments.":[158],"PyTorch":[160],"codes":[161],"for":[162],"paper":[164],"are":[165],"available":[166],"online.":[167]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
