{"id":"https://openalex.org/W4408857398","doi":"https://doi.org/10.1186/s42400-024-00330-9","title":"Unveiling the veil: high-frequency components as the key to understanding medical DNNs\u2019 vulnerability to adversarial examples","display_name":"Unveiling the veil: high-frequency components as the key to understanding medical DNNs\u2019 vulnerability to adversarial examples","publication_year":2025,"publication_date":"2025-03-27","ids":{"openalex":"https://openalex.org/W4408857398","doi":"https://doi.org/10.1186/s42400-024-00330-9"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00330-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00330-9","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00330-9","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00330-9","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057867117","display_name":"Yaguan Qian","orcid":"https://orcid.org/0000-0003-4056-9755"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yaguan Qian","raw_affiliation_strings":["School of Science, Zhejiang University of Science and Technology, Hangzhou, 3210023, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"School of Science, Zhejiang University of Science and Technology, Hangzhou, 3210023, Zhejiang, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102527336","display_name":"Renhui Tao","orcid":null},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Renhui Tao","raw_affiliation_strings":["School of Science, Zhejiang University of Science and Technology, Hangzhou, 3210023, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"School of Science, Zhejiang University of Science and Technology, Hangzhou, 3210023, Zhejiang, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112385078","display_name":"Huabin Du","orcid":null},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huabin Du","raw_affiliation_strings":["School of Science, Zhejiang University of Science and Technology, Hangzhou, 3210023, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"School of Science, Zhejiang University of Science and Technology, Hangzhou, 3210023, Zhejiang, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107061814","display_name":"Bin Wang","orcid":"https://orcid.org/0000-0003-1118-3618"},"institutions":[{"id":"https://openalex.org/I4210123185","display_name":"Zhejiang Lab","ror":"https://ror.org/02m2h7991","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210123185"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Wang","raw_affiliation_strings":["Zhejiang Key Laboratory of Artificial Intelligence of Things (AIoT) Network and Data Security, Hangzhou, 310051, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang Key Laboratory of Artificial Intelligence of Things (AIoT) Network and Data Security, Hangzhou, 310051, Zhejiang, China","institution_ids":["https://openalex.org/I4210123185"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5057867117"],"corresponding_institution_ids":["https://openalex.org/I168879160"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.02562797,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11515","display_name":"Bacillus and Francisella bacterial research","score":0.9656999707221985,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9448999762535095,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7451255321502686},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7431685924530029},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7060162425041199},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4512169361114502},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35049909353256226},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10365262627601624}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7451255321502686},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7431685924530029},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7060162425041199},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4512169361114502},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35049909353256226},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10365262627601624}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00330-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00330-9","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00330-9","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:05739e9309174a28b9c8f1ec18182a1f","is_oa":true,"landing_page_url":"https://doaj.org/article/05739e9309174a28b9c8f1ec18182a1f","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-12 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00330-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00330-9","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00330-9","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2893248472","display_name":null,"funder_award_id":"HIK2022008","funder_id":"https://openalex.org/F4320336335","funder_display_name":"Key Laboratory of Engineering Dielectrics and Its Application (Harbin University of Science and Technology), Ministry of Education"},{"id":"https://openalex.org/G5121827589","display_name":null,"funder_award_id":"92167203","funder_id":"https://openalex.org/F4320315254","funder_display_name":"Innovative Research Group Project of the National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320315254","display_name":"Innovative Research Group Project of the National Natural Science Foundation of China","ror":null},{"id":"https://openalex.org/F4320336335","display_name":"Key Laboratory of Engineering Dielectrics and Its Application (Harbin University of Science and Technology), Ministry of Education","ror":null}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4408857398.pdf"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W652324932","https://openalex.org/W855272188","https://openalex.org/W1981276685","https://openalex.org/W2194775991","https://openalex.org/W2557738935","https://openalex.org/W2611650229","https://openalex.org/W2616247523","https://openalex.org/W2772723798","https://openalex.org/W2924551358","https://openalex.org/W2962940806","https://openalex.org/W2963542245","https://openalex.org/W2963857521","https://openalex.org/W3021182036","https://openalex.org/W3034175346","https://openalex.org/W3035751626","https://openalex.org/W3094433718","https://openalex.org/W3101156210","https://openalex.org/W3102564565","https://openalex.org/W3203801990","https://openalex.org/W4210655294","https://openalex.org/W4220809634","https://openalex.org/W4224309787","https://openalex.org/W4307128397","https://openalex.org/W4362552446","https://openalex.org/W4382317971","https://openalex.org/W4384517863","https://openalex.org/W6601274740","https://openalex.org/W6829575424"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492"],"abstract_inverted_index":{"Abstract":[0],"Deep":[1],"Neural":[2],"Networks":[3],"(DNNs)":[4],"have":[5,18],"demonstrated":[6],"outstanding":[7],"performance":[8],"in":[9,64,72,78,103,115,170],"various":[10],"medical":[11,24,47,73,86,95,104,125,164],"image":[12,70],"processing":[13],"tasks.":[14],"However,":[15],"recent":[16],"studies":[17],"revealed":[19],"a":[20,39,75,140],"heightened":[21],"vulnerability":[22],"of":[23,124,156,163],"DNNs":[25,165],"to":[26,30,93,113,131,184],"adversarial":[27,132,167,178],"attacks":[28],"compared":[29,112],"their":[31],"natural":[32,50,79,116],"counterparts.":[33],"In":[34],"this":[35,136],"work,":[36],"we":[37,88,98,138],"present":[38],"novel":[40],"perspective":[41],"by":[42],"analyzing":[43],"the":[44,55,65,122,154,161],"disparities":[45],"between":[46],"datasets":[48],"and":[49],"datasets,":[51,74,87],"specifically":[52],"focusing":[53],"on":[54],"dataset":[56],"collection":[57],"process.":[58],"Our":[59,149],"analysis":[60,91],"uncovers":[61],"unique":[62],"differences":[63],"data":[66],"distribution":[67],"across":[68],"different":[69],"classes":[71],"phenomenon":[76],"absent":[77],"datasets.":[80,117],"To":[81,134],"gain":[82],"deeper":[83],"insights":[84],"into":[85],"employ":[89],"Fourier":[90],"tools":[92],"investigate":[94],"DNNs.":[96],"Intriguingly,":[97],"discover":[99],"that":[100,153],"high-frequency":[101,119],"components":[102,120],"images":[105],"exhibit":[106],"stronger":[107],"associations":[108],"with":[109],"corresponding":[110],"labels":[111],"those":[114],"These":[118],"distract":[121],"attention":[123],"DNNs,":[126],"rendering":[127],"them":[128],"more":[129],"susceptible":[130],"images.":[133],"mitigate":[135],"vulnerability,":[137],"propose":[139],"preprocessing":[141],"technique":[142],"called":[143],"Removing":[144],"High-frequency":[145],"Components":[146],"(RH)":[147],"training.":[148],"experimental":[150],"results":[151],"demonstrate":[152],"application":[155],"RH":[157,173],"training":[158,174,179],"significantly":[159],"enhances":[160],"robustness":[162],"against":[166],"attacks.":[168,186],"Notably,":[169],"certain":[171],"scenarios,":[172],"even":[175],"outperforms":[176],"traditional":[177],"methods,":[180],"particularly":[181],"when":[182],"subjected":[183],"black-box":[185]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
