{"id":"https://openalex.org/W3010933377","doi":"https://doi.org/10.1145/3377170.3377220","title":"Research on the Influence of Kmeans Cluster Preprocessing on Adversarial Images","display_name":"Research on the Influence of Kmeans Cluster Preprocessing on Adversarial Images","publication_year":2019,"publication_date":"2019-12-20","ids":{"openalex":"https://openalex.org/W3010933377","doi":"https://doi.org/10.1145/3377170.3377220","mag":"3010933377"},"language":"en","primary_location":{"id":"doi:10.1145/3377170.3377220","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3377170.3377220","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100737152","display_name":"Guilin Chen","orcid":"https://orcid.org/0000-0002-2802-1407"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guilin Chen","raw_affiliation_strings":["The 63rd-research institute, National University of Defense Technology, China"],"affiliations":[{"raw_affiliation_string":"The 63rd-research institute, National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102864984","display_name":"Guanwu Wang","orcid":"https://orcid.org/0000-0001-9733-0505"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guanwu Wang","raw_affiliation_strings":["The 63rd-research institute, National University of Defense Technology, China"],"affiliations":[{"raw_affiliation_string":"The 63rd-research institute, National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060680817","display_name":"Jian Ju","orcid":"https://orcid.org/0000-0003-4886-0336"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Ju","raw_affiliation_strings":["The 63rd-research institute, National University of Defense Technology, China"],"affiliations":[{"raw_affiliation_string":"The 63rd-research institute, National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059879436","display_name":"Xianglin Wei","orcid":"https://orcid.org/0000-0002-6181-4441"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianglin Wei","raw_affiliation_strings":["The 63rd-research institute, National University of Defense Technology, China"],"affiliations":[{"raw_affiliation_string":"The 63rd-research institute, National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100737152"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.14,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.60499568,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"248","last_page":"252"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11515","display_name":"Bacillus and Francisella bacterial research","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.960099995136261,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/k-means-clustering","display_name":"k-means clustering","score":0.8162344694137573},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7217631340026855},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7018593549728394},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.5825102925300598},{"id":"https://openalex.org/keywords/cluster","display_name":"Cluster (spacecraft)","score":0.5486904978752136},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45396408438682556},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.3484002351760864},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.34466293454170227},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.05777508020401001}],"concepts":[{"id":"https://openalex.org/C207968372","wikidata":"https://www.wikidata.org/wiki/Q310401","display_name":"k-means clustering","level":3,"score":0.8162344694137573},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7217631340026855},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7018593549728394},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.5825102925300598},{"id":"https://openalex.org/C164866538","wikidata":"https://www.wikidata.org/wiki/Q367351","display_name":"Cluster (spacecraft)","level":2,"score":0.5486904978752136},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45396408438682556},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.3484002351760864},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.34466293454170227},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.05777508020401001}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3377170.3377220","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3377170.3377220","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2772693146","https://openalex.org/W2964082701","https://openalex.org/W6600402904","https://openalex.org/W6602628784","https://openalex.org/W6630167017"],"related_works":["https://openalex.org/W3105849702","https://openalex.org/W1629127207","https://openalex.org/W2390267673","https://openalex.org/W2120258591","https://openalex.org/W2378227553","https://openalex.org/W1584028106","https://openalex.org/W2113424041","https://openalex.org/W2385548616","https://openalex.org/W4313193953","https://openalex.org/W2967215460"],"abstract_inverted_index":{"Deep":[0],"learning":[1,17],"is":[2,46],"the":[3,6,14,24,43,54,84,90,93,96,108,118,125,140,149,157,160,163],"core":[4],"of":[5,16,26,92,95,120,127,142,151,159,166],"current":[7],"artificial":[8],"intelligence.":[9],"Neural":[10],"networks,":[11],"represented":[12],"by":[13],"depth":[15],"technology,":[18],"has":[19,39],"been":[20],"widely":[21],"applied":[22],"to":[23,57,74,112],"field":[25],"computer":[27,75],"vision,":[28],"such":[29],"as":[30,156],"automatic":[31],"driving,":[32],"and":[33,68,80,101,115],"face":[34],"recognition.":[35],"But":[36],"recent":[37],"research":[38],"shown":[40],"that":[41,110,134],"if":[42],"original":[44],"picture":[45],"added":[47],"visually":[48],"imperceptible":[49],"perturbations,":[50],"it":[51,69],"can":[52,63,146],"fool":[53],"neural":[55,97,152],"network":[56,153],"misclassify":[58],"it.":[59],"These":[60],"adversarial":[61,87,128],"images":[62,109],"be":[64,113],"generated":[65],"very":[66],"easily,":[67],"poses":[70],"a":[71],"great":[72],"threat":[73],"vision":[76],"security.":[77],"Therefore,":[78],"more":[79,81],"researches":[82],"involve":[83],"defenses":[85],"against":[86],"images.":[88,129],"With":[89],"use":[91,141],"characteristics":[94],"network's":[98],"own":[99],"fitting":[100],"generalization,":[102],"we":[103],"perform":[104],"Kmeans":[105],"clustering":[106,122,144,168],"on":[107,124],"need":[111],"identified,":[114],"then":[116],"evaluate":[117],"impact":[119],"different":[121],"values":[123,145],"classification":[126],"The":[130],"experimental":[131],"results":[132],"show":[133],"for":[135],"small":[136],"amplitude":[137],"perturbations":[138,161],"images,":[139],"smaller":[143],"largely":[147],"reverse":[148],"decline":[150],"accuracy.":[154],"However,":[155],"magnitude":[158],"increases,":[162],"defensive":[164],"effect":[165],"simple":[167],"becomes":[169],"weaker.":[170]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
