{"id":"https://openalex.org/W4308632279","doi":"https://doi.org/10.1145/3548606.3563550","title":"Poster","display_name":"Poster","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308632279","doi":"https://doi.org/10.1145/3548606.3563550"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3563550","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3563550","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024152438","display_name":"Leo Hyun Park","orcid":"https://orcid.org/0000-0002-3100-2258"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Leo Hyun Park","raw_affiliation_strings":["Yonsei University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100359863","display_name":"Jaewoo Park","orcid":"https://orcid.org/0000-0002-7900-5749"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jaewoo Park","raw_affiliation_strings":["Yonsei University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038881047","display_name":"Soochang Chung","orcid":"https://orcid.org/0000-0003-4473-3946"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Soochang Chung","raw_affiliation_strings":["Yonsei University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071314604","display_name":"Jaeuk Kim","orcid":"https://orcid.org/0000-0002-5562-2937"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jaeuk Kim","raw_affiliation_strings":["Yonsei University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025957374","display_name":"Myung Gyo Oh","orcid":"https://orcid.org/0000-0002-0253-1580"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Myung Gyo Oh","raw_affiliation_strings":["Yonsei University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076713179","display_name":"Taekyoung Kwon","orcid":"https://orcid.org/0000-0002-7795-0077"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Taekyoung Kwon","raw_affiliation_strings":["Yonsei University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I193775966"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5024152438"],"corresponding_institution_ids":["https://openalex.org/I193775966"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11867055,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3439","last_page":"3441"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9631999731063843,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9409000277519226,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/magnet","display_name":"Magnet","score":0.7092374563217163},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.65459805727005},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6442288160324097},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5905529856681824},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5104445219039917},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.4763786494731903},{"id":"https://openalex.org/keywords/manifold","display_name":"Manifold (fluid mechanics)","score":0.440862774848938},{"id":"https://openalex.org/keywords/white-box","display_name":"White box","score":0.4266493320465088},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4138909876346588},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3931809067726135},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1867692768573761},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.18472370505332947},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.14172953367233276},{"id":"https://openalex.org/keywords/mechanical-engineering","display_name":"Mechanical engineering","score":0.09330180287361145}],"concepts":[{"id":"https://openalex.org/C16389437","wikidata":"https://www.wikidata.org/wiki/Q11421","display_name":"Magnet","level":2,"score":0.7092374563217163},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.65459805727005},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6442288160324097},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5905529856681824},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5104445219039917},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.4763786494731903},{"id":"https://openalex.org/C529865628","wikidata":"https://www.wikidata.org/wiki/Q1790740","display_name":"Manifold (fluid mechanics)","level":2,"score":0.440862774848938},{"id":"https://openalex.org/C180932941","wikidata":"https://www.wikidata.org/wiki/Q997233","display_name":"White box","level":2,"score":0.4266493320465088},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4138909876346588},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3931809067726135},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1867692768573761},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18472370505332947},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.14172953367233276},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.09330180287361145},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3548606.3563550","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3563550","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5911861303","display_name":null,"funder_award_id":"2019R1A2C1088802","funder_id":"https://openalex.org/F4320320671","funder_display_name":"National Research Foundation"}],"funders":[{"id":"https://openalex.org/F4320320671","display_name":"National Research Foundation","ror":"https://ror.org/05s0g1g46"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2738001131","https://openalex.org/W2963857521"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W4246396837","https://openalex.org/W3176240006","https://openalex.org/W3126451824","https://openalex.org/W2886520477","https://openalex.org/W4297846880","https://openalex.org/W2950942529","https://openalex.org/W4285052570","https://openalex.org/W4324108765","https://openalex.org/W4307929675"],"abstract_inverted_index":{"MagNet":[0,15,43,54,135],"is":[1,16,24,55,163],"a":[2],"defense":[3,122],"method":[4,123],"that":[5,50,105],"adopts":[6],"autoencoders":[7],"to":[8,26,115,153],"detect":[9],"and":[10,20,37,86,168],"purify":[11],"adversarial":[12,125],"examples.":[13],"Although":[14],"robust":[17],"against":[18],"grey-box":[19,119],"black-box":[21],"attacks,":[22],"it":[23],"vulnerable":[25],"white-box":[27],"attacks.":[28],"Despite":[29],"this":[30,66,147],"prior":[31],"knowledge,":[32],"the":[33,40,51,56,59,74,89,110,116,138,143,156],"fundamental":[34],"reason":[35],"for":[36,73,127,165],"mitigation":[38],"of":[39,42,53,58,76,113,146,159],"vulnerability":[41],"have":[44],"not":[45],"been":[46],"discussed.":[47],"We":[48,78],"suggest":[49],"challenge":[52],"generalization":[57,157],"data":[60,103],"manifold.":[61],"To":[62],"explain":[63],"this,":[64],"in":[65],"work,":[67,148],"we":[68,149],"leverage":[69],"deep":[70,160],"learning":[71,161],"coverage":[72,95,162],"reformer":[75,90],"MagNet.":[77],"mutate":[79],"training":[80],"images":[81],"through":[82],"image":[83],"transformation":[84],"algorithms":[85],"then":[87],"train":[88],"using":[91],"mutants":[92,99],"with":[93,137],"new":[94],"information.":[96],"The":[97],"selected":[98],"provide":[100],"an":[101],"interesting":[102],"manifold,":[104],"cannot":[106],"be":[107],"handled":[108],"by":[109],"random":[111],"noise":[112],"MagNet,":[114],"reformer.":[117],"In":[118],"settings,":[120],"our":[121],"classified":[124],"examples":[126],"various":[128],"perturbation":[129],"sizes":[130],"much":[131],"more":[132],"accurately":[133],"than":[134],"even":[136],"same":[139],"architecture.":[140],"Based":[141],"on":[142],"preliminary":[144],"result":[145],"consider":[150],"future":[151],"work":[152],"identify":[154],"whether":[155],"power":[158],"effective":[164],"stronger":[166],"adversaries":[167],"different":[169],"architectures.":[170]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-11-13T00:00:00"}
