{"id":"https://openalex.org/W4392756889","doi":"https://doi.org/10.1186/s42400-023-00196-3","title":"Maxwell\u2019s Demon in MLP-Mixer: towards transferable adversarial attacks","display_name":"Maxwell\u2019s Demon in MLP-Mixer: towards transferable adversarial attacks","publication_year":2024,"publication_date":"2024-03-02","ids":{"openalex":"https://openalex.org/W4392756889","doi":"https://doi.org/10.1186/s42400-023-00196-3"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-023-00196-3","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1186/s42400-023-00196-3","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00196-3","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00196-3","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077368865","display_name":"Haoran Lyu","orcid":null},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haoran Lyu","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100455413","display_name":"Yajie Wang","orcid":"https://orcid.org/0000-0002-0962-4464"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yajie Wang","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003198271","display_name":"Yu\u2010an Tan","orcid":"https://orcid.org/0000-0001-6404-8853"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu-an Tan","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029867593","display_name":"Huipeng Zhou","orcid":"https://orcid.org/0000-0002-4840-6558"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huipeng Zhou","raw_affiliation_strings":["School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101756800","display_name":"Yuhang Zhao","orcid":"https://orcid.org/0000-0002-9598-5687"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuhang Zhao","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017675981","display_name":"Quanxin Zhang","orcid":"https://orcid.org/0000-0002-5094-7388"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Quanxin Zhang","raw_affiliation_strings":["School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-5094-7388","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5077368865"],"corresponding_institution_ids":["https://openalex.org/I125839683"],"apc_list":null,"apc_paid":null,"fwci":0.3254,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.60660208,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"7","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12166","display_name":"Ion-surface interactions and analysis","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/maxwells-demon","display_name":"Maxwell's demon","score":0.7934825420379639},{"id":"https://openalex.org/keywords/demon","display_name":"Demon","score":0.7676622867584229},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5701156258583069},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5538644194602966},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4226565957069397},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35254326462745667},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.26031747460365295}],"concepts":[{"id":"https://openalex.org/C108292794","wikidata":"https://www.wikidata.org/wiki/Q212397","display_name":"Maxwell's demon","level":2,"score":0.7934825420379639},{"id":"https://openalex.org/C2779227343","wikidata":"https://www.wikidata.org/wiki/Q5256190","display_name":"Demon","level":2,"score":0.7676622867584229},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5701156258583069},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5538644194602966},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4226565957069397},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35254326462745667},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.26031747460365295},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-023-00196-3","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1186/s42400-023-00196-3","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00196-3","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:051c5250046545ea93e6024c4d0a4c2c","is_oa":false,"landing_page_url":"https://doaj.org/article/051c5250046545ea93e6024c4d0a4c2c","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 7, Iss 1, Pp 1-9 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-023-00196-3","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1186/s42400-023-00196-3","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00196-3","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4399999976158142,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4392756889.pdf","grobid_xml":"https://content.openalex.org/works/W4392756889.grobid-xml"},"referenced_works_count":11,"referenced_works":["https://openalex.org/W2194775991","https://openalex.org/W2774644650","https://openalex.org/W2962847335","https://openalex.org/W2962872506","https://openalex.org/W2963163009","https://openalex.org/W2963446712","https://openalex.org/W2969542116","https://openalex.org/W3121523901","https://openalex.org/W3163465952","https://openalex.org/W3166225737","https://openalex.org/W6931259419"],"related_works":["https://openalex.org/W2809301459","https://openalex.org/W2304932572","https://openalex.org/W1579070488","https://openalex.org/W1599699106","https://openalex.org/W2546492573","https://openalex.org/W1613398467","https://openalex.org/W1525022477","https://openalex.org/W2077294380","https://openalex.org/W3080825431","https://openalex.org/W2175782177"],"abstract_inverted_index":{"Abstract":[0],"Models":[1],"based":[2,123,156],"on":[3,40,124],"MLP-Mixer":[4,22,75,155,181],"architecture":[5],"are":[6],"becoming":[7],"popular,":[8],"but":[9],"they":[10],"still":[11],"suffer":[12],"from":[13],"adversarial":[14,27,41,106,182],"examples.":[15],"Although":[16],"it":[17,187],"has":[18,36],"been":[19,37],"shown":[20],"that":[21,89],"is":[23],"more":[24,188],"robust":[25,189],"to":[26,30,44,83,149,159,167],"attacks":[28,42,134],"compared":[29],"convolutional":[31],"neural":[32],"networks":[33],"(CNNs),":[34],"there":[35],"no":[38],"research":[39],"tailored":[43],"its":[45,102],"architecture.":[46],"In":[47],"this":[48,52],"paper,":[49],"we":[50,66],"fill":[51],"gap.":[53],"We":[54,87,164],"propose":[55],"a":[56,128],"dedicated":[57],"attack":[58,169],"framework":[59],"called":[60],"Maxwell\u2019s":[61],"demon":[62],"Attack":[63],"(MA).":[64],"Specifically,":[65],"break":[67],"the":[68,74,91,95,114,151,175,180],"channel-mixing":[69],"and":[70,116,158,184],"token-mixing":[71],"mechanisms":[72],"of":[73,79,94,98,119,132,179],"by":[76,100],"perturbing":[77],"inputs":[78,103,126],"each":[80],"Mixer":[81],"layer":[82],"achieve":[84,165],"high":[85],"transferability.":[86,110],"demonstrate":[88],"disrupting":[90],"MLP-Mixer\u2019s":[92],"capture":[93],"main":[96],"information":[97],"images":[99],"masking":[101],"can":[104,142],"generate":[105],"examples":[107],"with":[108,146,161],"cross-architectural":[109],"Extensive":[111],"evaluations":[112],"show":[113],"effectiveness":[115],"superior":[117],"performance":[118,170],"MA.":[120],"Perturbations":[121],"generated":[122],"masked":[125],"obtain":[127],"higher":[129],"success":[130],"rate":[131],"black-box":[133],"than":[135],"existing":[136,147],"transfer":[137],"attacks.":[138],"Moreover,":[139],"our":[140],"approach":[141],"be":[143],"easily":[144],"combined":[145],"methods":[148],"improve":[150],"transferability":[152],"both":[153],"within":[154],"models":[157,160],"different":[162],"architectures.":[163],"up":[166],"55.9%":[168],"improvement.":[171],"Our":[172],"work":[173],"exploits":[174],"true":[176],"generalization":[177],"potential":[178],"space":[183],"helps":[185],"make":[186],"for":[190],"future":[191],"deployments.":[192]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
