{"id":"https://openalex.org/W3125991832","doi":"https://doi.org/10.1145/3324884.3418903","title":"Styx","display_name":"Styx","publication_year":2020,"publication_date":"2020-12-21","ids":{"openalex":"https://openalex.org/W3125991832","doi":"https://doi.org/10.1145/3324884.3418903","mag":"3125991832"},"language":"en","primary_location":{"id":"doi:10.1145/3324884.3418903","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3324884.3418903","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031813114","display_name":"Meixi Liu","orcid":"https://orcid.org/0000-0002-8146-4530"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meixi Liu","raw_affiliation_strings":["National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101827489","display_name":"Weijiang Hong","orcid":"https://orcid.org/0000-0002-7092-3658"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weijiang Hong","raw_affiliation_strings":["National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013949426","display_name":"Weiyu Pan","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiyu Pan","raw_affiliation_strings":["National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020966921","display_name":"Chendong Feng","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chendong Feng","raw_affiliation_strings":["National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024920190","display_name":"Zhenbang Chen","orcid":"https://orcid.org/0000-0002-4066-7892"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenbang Chen","raw_affiliation_strings":["National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046184004","display_name":"Ji Wang","orcid":"https://orcid.org/0000-0002-4199-2793"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ji Wang","raw_affiliation_strings":["National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5031813114"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.2651,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.65419959,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1260","last_page":"1261"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.884193480014801},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.7684986591339111},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6888967752456665},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.581939160823822},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.49919581413269043},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.46300652623176575},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3892456293106079},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.06472724676132202}],"concepts":[{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.884193480014801},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.7684986591339111},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6888967752456665},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.581939160823822},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.49919581413269043},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.46300652623176575},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3892456293106079},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.06472724676132202},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3324884.3418903","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3324884.3418903","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1498436455","https://openalex.org/W2243397390","https://openalex.org/W2395317528","https://openalex.org/W2594877703","https://openalex.org/W2597490979","https://openalex.org/W2616028256","https://openalex.org/W2738063173","https://openalex.org/W2738638456","https://openalex.org/W2778624544","https://openalex.org/W2793633339","https://openalex.org/W2804337238","https://openalex.org/W2963207607","https://openalex.org/W2963542245","https://openalex.org/W2964082701","https://openalex.org/W2964153729","https://openalex.org/W3099444373"],"related_works":["https://openalex.org/W1629725936","https://openalex.org/W2962182036","https://openalex.org/W3035394992","https://openalex.org/W2952919291","https://openalex.org/W3193857078","https://openalex.org/W3208304128","https://openalex.org/W4311734044","https://openalex.org/W3092161682","https://openalex.org/W4288853838","https://openalex.org/W4322008322"],"abstract_inverted_index":{"The":[0,103],"robustness":[1,28],"of":[2,29,110],"deep":[3],"neural":[4],"network":[5],"(DNN)":[6],"is":[7],"critical":[8],"and":[9,72,94],"challenging":[10],"to":[11,25,58,80],"ensure.":[12],"In":[13,42],"this":[14,43],"paper,":[15],"we":[16],"propose":[17],"a":[18],"general":[19],"data-oriented":[20],"mutation":[21,75],"framework,":[22],"called":[23],"Styx,":[24],"improve":[26],"the":[27,39,47,51,56,63,98,108],"DNN.":[30],"Styx":[31,45,68,88,96],"generates":[32],"new":[33],"training":[34,40,101],"data":[35],"by":[36],"slightly":[37],"mutating":[38],"data.":[41],"way,":[44],"ensures":[46],"DNN's":[48],"accuracy":[49],"on":[50,89],"test":[52],"dataset":[53],"while":[54],"improving":[55,62],"adaptability":[57],"small":[59],"perturbations,":[60],"i.e.,":[61],"robustness.":[64],"We":[65,85],"have":[66,86],"instantiated":[67],"for":[69],"image":[70,82],"classification":[71,83],"proposed":[73],"pixel-level":[74],"rules":[76],"that":[77],"are":[78],"applicable":[79],"any":[81],"DNNs.":[84],"applied":[87],"several":[90],"commonly":[91],"used":[92],"benchmarks":[93],"compared":[95],"with":[97],"representative":[99],"adversarial":[100],"methods.":[102],"preliminary":[104],"experimental":[105],"results":[106],"indicate":[107],"effectiveness":[109],"Styx.":[111]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2021-02-01T00:00:00"}
