{"id":"https://openalex.org/W4414360072","doi":"https://doi.org/10.24963/ijcai.2025/158","title":"Temporal Consistency Constrained Transferable Adversarial Attacks with Background Mixup for Action Recognition","display_name":"Temporal Consistency Constrained Transferable Adversarial Attacks with Background Mixup for Action Recognition","publication_year":2025,"publication_date":"2025-09-01","ids":{"openalex":"https://openalex.org/W4414360072","doi":"https://doi.org/10.24963/ijcai.2025/158"},"language":"en","primary_location":{"id":"doi:10.24963/ijcai.2025/158","is_oa":false,"landing_page_url":"https://doi.org/10.24963/ijcai.2025/158","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100741315","display_name":"Ping Li","orcid":"https://orcid.org/0000-0002-8515-7773"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]},{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ping Li","raw_affiliation_strings":["School of Computer Science and Technology, Hangzhou Dianzi University","State Key Laboratory for Novel Software Technology, Nanjing University"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Hangzhou Dianzi University","institution_ids":["https://openalex.org/I50760025"]},{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025145910","display_name":"Jian Ni","orcid":"https://orcid.org/0000-0002-7169-3989"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianan Ni","raw_affiliation_strings":["School of Computer Science and Technology, Hangzhou Dianzi University"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Hangzhou Dianzi University","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101415754","display_name":"Bo Pang","orcid":"https://orcid.org/0000-0003-0151-7581"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Pang","raw_affiliation_strings":["School of Computer Science and Technology, Hangzhou Dianzi University"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Hangzhou Dianzi University","institution_ids":["https://openalex.org/I50760025"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100741315"],"corresponding_institution_ids":["https://openalex.org/I50760025","https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":2.8331,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.92480124,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1413","last_page":"1421"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10812","display_name":"Human Pose and Action Recognition","score":0.9700999855995178,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8773000240325928},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6190999746322632},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.5706999897956848},{"id":"https://openalex.org/keywords/decision-boundary","display_name":"Decision boundary","score":0.4645000100135803},{"id":"https://openalex.org/keywords/action","display_name":"Action (physics)","score":0.39579999446868896},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.38119998574256897},{"id":"https://openalex.org/keywords/margin","display_name":"Margin (machine learning)","score":0.35100001096725464},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.3434000015258789}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8773000240325928},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6270999908447266},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6190999746322632},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5995000004768372},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.5706999897956848},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.489300012588501},{"id":"https://openalex.org/C42023084","wikidata":"https://www.wikidata.org/wiki/Q5249231","display_name":"Decision boundary","level":3,"score":0.4645000100135803},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.39579999446868896},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.38119998574256897},{"id":"https://openalex.org/C774472","wikidata":"https://www.wikidata.org/wiki/Q6760393","display_name":"Margin (machine learning)","level":2,"score":0.35100001096725464},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.3434000015258789},{"id":"https://openalex.org/C62354387","wikidata":"https://www.wikidata.org/wiki/Q875399","display_name":"Boundary (topology)","level":2,"score":0.3425999879837036},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.3303000032901764},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.3208000063896179},{"id":"https://openalex.org/C61272859","wikidata":"https://www.wikidata.org/wiki/Q7834031","display_name":"Transferability","level":3,"score":0.3192000091075897},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.3183000087738037},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.30730000138282776},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.30320000648498535},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.29649999737739563},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.27489998936653137},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2689000070095062},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.26409998536109924},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.25290000438690186}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.24963/ijcai.2025/158","is_oa":false,"landing_page_url":"https://doi.org/10.24963/ijcai.2025/158","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Action":[0],"recognition":[1,219],"models":[2,16],"using":[3],"deep":[4],"learning":[5],"are":[6,12,52],"vulnerable":[7],"to":[8,84,110,151],"adversarial":[9,57,79,107,169,214],"examples,":[10],"which":[11,54,70,178],"transferable":[13,24],"across":[14,216],"other":[15],"trained":[17],"on":[18,35,186,191],"the":[19,36,39,43,49,56,66,74,78,98,112,133,137,144,159,166,180,183,211],"same":[20],"data":[21],"modality.":[22],"Existing":[23],"attack":[25,67,92,139,155,184],"methods":[26],"face":[27],"two":[28,192],"major":[29],"challenges:":[30],"1)":[31],"they":[32],"heavily":[33],"rely":[34],"assumption":[37],"that":[38,206],"decision":[40,62],"boundaries":[41],"of":[42,168,182,213],"surrogate":[44],"(a.k.a.,":[45],"source)":[46],"model":[47,51,114],"and":[48,59,126,171,197,199],"target":[50],"similar,":[53],"limits":[55],"transferability;":[58],"2)":[60],"their":[61],"boundary":[63],"difference":[64],"makes":[65],"direction":[68,185],"uncertain,":[69],"may":[71],"result":[72],"in":[73],"gradient":[75,167,175],"oscillation,":[76],"weakening":[77],"attack.":[80],"This":[81],"motivates":[82],"us":[83],"propose":[85],"a":[86,104,173],"Background":[87],"Mixup-induced":[88],"Temporal":[89],"Consistency":[90],"(BMTC)":[91],"method":[93,208],"for":[94,141,164],"action":[95],"recognition.":[96],"From":[97],"input":[99],"transformation":[100],"perspective,":[101],"we":[102,118,157],"design":[103,172],"model-agnostic":[105],"background":[106,129,134,160],"mixup":[108,142],"module":[109],"reduce":[111],"surrogate-target":[113],"dependency.":[115],"In":[116],"particular,":[117],"randomly":[119],"sample":[120],"one":[121,200],"video":[122,193],"from":[123],"each":[124],"category":[125,161],"make":[127],"its":[128],"frame,":[130],"while":[131],"selecting":[132],"frame":[135,146],"with":[136,143],"top":[138],"ability":[140],"clean":[145],"by":[147],"reinforcement":[148],"learning.":[149],"Moreover,":[150],"ensure":[152],"an":[153],"explicit":[154],"direction,":[156],"leverage":[158],"as":[162],"guidance":[163],"updating":[165],"example,":[170],"temporal":[174],"consistency":[176],"loss,":[177],"strengthens":[179],"stability":[181],"subsequent":[187],"frames.":[188],"Empirical":[189],"studies":[190],"datasets,":[194],"i.e.,":[195,203],"UCF101":[196],"Kinetics-400,":[198],"image":[201],"dataset,":[202],"ImageNet,":[204],"demonstrate":[205],"our":[207],"significantly":[209],"boosts":[210],"transferability":[212],"examples":[215],"several":[217],"action/image":[218],"models.":[220]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
