{"id":"https://openalex.org/W3206423720","doi":"https://doi.org/10.3233/jifs-211157","title":"Random Transformation of image brightness for adversarial attack","display_name":"Random Transformation of image brightness for adversarial attack","publication_year":2021,"publication_date":"2021-10-20","ids":{"openalex":"https://openalex.org/W3206423720","doi":"https://doi.org/10.3233/jifs-211157","mag":"3206423720"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-211157","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jifs-211157","pdf_url":"https://content.iospress.com:443/download/journal-of-intelligent-and-fuzzy-systems/ifs211157?id=journal-of-intelligent-and-fuzzy-systems%2Fifs211157","source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://content.iospress.com:443/download/journal-of-intelligent-and-fuzzy-systems/ifs211157?id=journal-of-intelligent-and-fuzzy-systems%2Fifs211157","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100657706","display_name":"Bo Yang","orcid":"https://orcid.org/0000-0002-0859-2747"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bo Yang","raw_affiliation_strings":["Henan Key Laboratory of Information Security, Zhengzhou, Henan, China","State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Information Security, Zhengzhou, Henan, China","institution_ids":[]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100786960","display_name":"Kaiyong Xu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kaiyong Xu","raw_affiliation_strings":["Henan Key Laboratory of Information Security, Zhengzhou, Henan, China","State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Information Security, Zhengzhou, Henan, China","institution_ids":[]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013133603","display_name":"Hengjun Wang","orcid":"https://orcid.org/0000-0002-2392-4172"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hengjun Wang","raw_affiliation_strings":["Henan Key Laboratory of Information Security, Zhengzhou, Henan, China","State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Information Security, Zhengzhou, Henan, China","institution_ids":[]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047763068","display_name":"Hengwei Zhang","orcid":"https://orcid.org/0000-0002-1649-7336"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hengwei Zhang","raw_affiliation_strings":["Henan Key Laboratory of Information Security, Zhengzhou, Henan, China","State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Information Security, Zhengzhou, Henan, China","institution_ids":[]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5047763068"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.8398,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.79182315,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"42","issue":"3","first_page":"1693","last_page":"1704"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.9847999811172485,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9796000123023987,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8375735282897949},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.827556848526001},{"id":"https://openalex.org/keywords/transferability","display_name":"Transferability","score":0.7989110946655273},{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.7901536226272583},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.6244673132896423},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6027258038520813},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5989899635314941},{"id":"https://openalex.org/keywords/transformation","display_name":"Transformation (genetics)","score":0.5895797610282898},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5521916747093201},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4879164397716522},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.42244648933410645},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.40251827239990234},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.401040256023407},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3270952105522156}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8375735282897949},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.827556848526001},{"id":"https://openalex.org/C61272859","wikidata":"https://www.wikidata.org/wiki/Q7834031","display_name":"Transferability","level":3,"score":0.7989110946655273},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.7901536226272583},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.6244673132896423},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6027258038520813},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5989899635314941},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.5895797610282898},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5521916747093201},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4879164397716522},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.42244648933410645},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.40251827239990234},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.401040256023407},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3270952105522156},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C140331021","wikidata":"https://www.wikidata.org/wiki/Q1868104","display_name":"Logit","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-211157","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jifs-211157","pdf_url":"https://content.iospress.com:443/download/journal-of-intelligent-and-fuzzy-systems/ifs211157?id=journal-of-intelligent-and-fuzzy-systems%2Fifs211157","source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.3233/jifs-211157","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jifs-211157","pdf_url":"https://content.iospress.com:443/download/journal-of-intelligent-and-fuzzy-systems/ifs211157?id=journal-of-intelligent-and-fuzzy-systems%2Fifs211157","source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G466649759","display_name":null,"funder_award_id":"2017Y","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7625510445","display_name":null,"funder_award_id":"2017YFB0801900","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8340078520","display_name":null,"funder_award_id":"2017YF","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8823009050","display_name":null,"funder_award_id":"2017YFB","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3206423720.pdf","grobid_xml":"https://content.openalex.org/works/W3206423720.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W9657784","https://openalex.org/W104184427","https://openalex.org/W2097117768","https://openalex.org/W2117539524","https://openalex.org/W2183341477","https://openalex.org/W2194775991","https://openalex.org/W2302255633","https://openalex.org/W2618530766","https://openalex.org/W2765384636","https://openalex.org/W2774644650","https://openalex.org/W2798302089","https://openalex.org/W2950048339","https://openalex.org/W2950864148","https://openalex.org/W2953536436","https://openalex.org/W2962835968","https://openalex.org/W2962847335","https://openalex.org/W2963207607","https://openalex.org/W2963744840","https://openalex.org/W2964082701","https://openalex.org/W2964121744","https://openalex.org/W2964153729","https://openalex.org/W2964350391","https://openalex.org/W3090449962","https://openalex.org/W4288086177"],"related_works":["https://openalex.org/W4288055406","https://openalex.org/W3137894200","https://openalex.org/W3092178728","https://openalex.org/W4226402597","https://openalex.org/W4200630034","https://openalex.org/W3132910851","https://openalex.org/W4377864639","https://openalex.org/W2950864148","https://openalex.org/W2570685808","https://openalex.org/W2997056298"],"abstract_inverted_index":{"Deep":[0],"neural":[1],"networks":[2],"(DNNs)":[3],"are":[4,10,30],"vulnerable":[5],"to":[6,17,40,67,121,129],"adversarial":[7,32,63,91,106,131],"examples,":[8,64],"which":[9,110],"crafted":[11],"by":[12],"adding":[13],"small,":[14],"human-imperceptible":[15],"perturbations":[16],"the":[18,23,51,55,60,88,139,144,147,186],"original":[19],"images,":[20],"but":[21],"make":[22],"model":[24],"output":[25],"inaccurate":[26],"predictions.":[27],"Before":[28],"DNNs":[29],"deployed,":[31],"attacks":[33,166],"can":[34,84,111,181],"thus":[35],"be":[36,68,112],"an":[37,105],"important":[38],"method":[39,158,180],"evaluate":[41,183],"and":[42,93,128,184],"select":[43],"robust":[44,125],"models":[45],"in":[46,87],"safety-critical":[47],"applications.":[48],"However,":[49],"under":[50],"challenging":[52],"black-box":[53,165],"setting,":[54],"attack":[56,127,169],"success":[57,162],"rate,":[58],"i.e.,":[59],"transferability":[61],"of":[62,81,90,99,146,188],"still":[65],"needs":[66],"improved.":[69],"Based":[70],"on":[71,138,151,172],"image":[72,82],"augmentation":[73],"methods,":[74],"this":[75,100,102,179],"paper":[76,103],"found":[77],"that":[78,178],"random":[79],"transformation":[80],"brightness":[83],"eliminate":[85],"overfitting":[86],"generation":[89,108],"examples":[92,132],"improve":[94,185],"their":[95],"transferability.":[96,135],"In":[97],"light":[98],"phenomenon,":[101],"proposes":[104],"example":[107],"method,":[109],"integrated":[113],"with":[114,133],"Fast":[115],"Gradient":[116],"Sign":[117],"Method":[118],"(FGSM)-related":[119],"methods":[120,170],"build":[122],"a":[123,160],"more":[124],"gradient-based":[126],"generate":[130],"better":[134],"Extensive":[136],"experiments":[137],"ImageNet":[140],"dataset":[141],"have":[142],"demonstrated":[143],"effectiveness":[145],"aforementioned":[148],"method.":[149],"Whether":[150],"normally":[152],"or":[153],"adversarially":[154],"trained":[155],"networks,":[156],"our":[157],"has":[159],"higher":[161],"rate":[163],"for":[164],"than":[167],"other":[168],"based":[171],"data":[173],"augmentation.":[174],"It":[175],"is":[176],"hoped":[177],"help":[182],"robustness":[187],"models.":[189]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
