{"id":"https://openalex.org/W2984280703","doi":"https://doi.org/10.3390/a13110268","title":"Simple Iterative Method for Generating Targeted Universal Adversarial Perturbations","display_name":"Simple Iterative Method for Generating Targeted Universal Adversarial Perturbations","publication_year":2020,"publication_date":"2020-10-22","ids":{"openalex":"https://openalex.org/W2984280703","doi":"https://doi.org/10.3390/a13110268","mag":"2984280703"},"language":"en","primary_location":{"id":"doi:10.3390/a13110268","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a13110268","pdf_url":"https://www.mdpi.com/1999-4893/13/11/268/pdf?version=1604375614","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-4893/13/11/268/pdf?version=1604375614","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Hokuto Hirano","orcid":null},"institutions":[{"id":"https://openalex.org/I207014233","display_name":"Kyushu Institute of Technology","ror":"https://ror.org/02278tr80","country_code":"JP","type":"education","lineage":["https://openalex.org/I207014233"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hokuto Hirano","raw_affiliation_strings":["Department of Bioscience and Bioinformatics, Kyushu Institute of Technology, Iizuka, Fukuoka 820-8502, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Bioscience and Bioinformatics, Kyushu Institute of Technology, Iizuka, Fukuoka 820-8502, Japan","institution_ids":["https://openalex.org/I207014233"]}]},{"author_position":"last","author":{"id":null,"display_name":"Kazuhiro Takemoto","orcid":"https://orcid.org/0000-0002-6355-1366"},"institutions":[{"id":"https://openalex.org/I207014233","display_name":"Kyushu Institute of Technology","ror":"https://ror.org/02278tr80","country_code":"JP","type":"education","lineage":["https://openalex.org/I207014233"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Kazuhiro Takemoto","raw_affiliation_strings":["Department of Bioscience and Bioinformatics, Kyushu Institute of Technology, Iizuka, Fukuoka 820-8502, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Bioscience and Bioinformatics, Kyushu Institute of Technology, Iizuka, Fukuoka 820-8502, Japan","institution_ids":["https://openalex.org/I207014233"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I207014233"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":2.1941,"has_fulltext":true,"cited_by_count":24,"citation_normalized_percentile":{"value":0.89873953,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"13","issue":"11","first_page":"268","last_page":"268"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.0006000000284984708,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":9.999999747378752e-05,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.5519000291824341},{"id":"https://openalex.org/keywords/iterative-method","display_name":"Iterative method","score":0.5012000203132629},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.42669999599456787},{"id":"https://openalex.org/keywords/perturbation","display_name":"Perturbation (astronomy)","score":0.3971000015735626},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.38580000400543213},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3352999985218048}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7512000203132629},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.564300000667572},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.5519000291824341},{"id":"https://openalex.org/C159694833","wikidata":"https://www.wikidata.org/wiki/Q2321565","display_name":"Iterative method","level":2,"score":0.5012000203132629},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44760000705718994},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.42669999599456787},{"id":"https://openalex.org/C177918212","wikidata":"https://www.wikidata.org/wiki/Q803623","display_name":"Perturbation (astronomy)","level":2,"score":0.3971000015735626},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.38580000400543213},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3352999985218048},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.3188000023365021},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3174999952316284},{"id":"https://openalex.org/C115680565","wikidata":"https://www.wikidata.org/wiki/Q5977448","display_name":"Gradient method","level":2,"score":0.27129998803138733},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.25859999656677246},{"id":"https://openalex.org/C153258448","wikidata":"https://www.wikidata.org/wiki/Q1199743","display_name":"Gradient descent","level":3,"score":0.257099986076355}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/a13110268","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a13110268","pdf_url":"https://www.mdpi.com/1999-4893/13/11/268/pdf?version=1604375614","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1911.06502","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1911.06502","pdf_url":"https://arxiv.org/pdf/1911.06502","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:doaj.org/article:ed207eebf8be40bc84bd7a44a5d1b4aa","is_oa":true,"landing_page_url":"https://doaj.org/article/ed207eebf8be40bc84bd7a44a5d1b4aa","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Algorithms, Vol 13, Iss 11, p 268 (2020)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/1999-4893/13/11/268/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/a13110268","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Algorithms; Volume 13; Issue 11; Pages: 268","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/a13110268","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a13110268","pdf_url":"https://www.mdpi.com/1999-4893/13/11/268/pdf?version=1604375614","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2984280703.pdf","grobid_xml":"https://content.openalex.org/works/W2984280703.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W1686810756","https://openalex.org/W2067713319","https://openalex.org/W2117539524","https://openalex.org/W2194775991","https://openalex.org/W2243397390","https://openalex.org/W2543927648","https://openalex.org/W2581082771","https://openalex.org/W2795727551","https://openalex.org/W2835378829","https://openalex.org/W2924551358","https://openalex.org/W2963165363","https://openalex.org/W2963178695","https://openalex.org/W2963560523","https://openalex.org/W2963809642","https://openalex.org/W2963857521","https://openalex.org/W6752654261"],"related_works":[],"abstract_inverted_index":{"Deep":[0],"neural":[1],"networks":[2],"(DNNs)":[3],"are":[4,35],"vulnerable":[5],"to":[6,37,62,95,132],"adversarial":[7,18,122],"attacks.":[8,87,100],"In":[9],"particular,":[10],"a":[11,67,91,120],"single":[12],"perturbation":[13,19,123],"known":[14],"as":[15],"the":[16,40,56,60,71,104,113,129,141],"universal":[17],"(UAP)":[20],"can":[21,156],"foil":[22],"most":[23],"classification":[24,138],"tasks":[25],"conducted":[26],"by":[27],"DNNs.":[28,43],"Thus,":[29],"different":[30],"methods":[31],"for":[32,75,85,98,108,118,124,136,147],"generating":[33,109,119],"UAPs":[34,74,84,97,111,146,155],"required":[36],"fully":[38],"evaluate":[39],"vulnerability":[41],"of":[42,73,83,143],"A":[44],"realistic":[45],"evaluation":[46],"would":[47],"be":[48,157],"with":[49],"cases":[50],"that":[51,82,153],"consider":[52],"targeted":[53,76,99,121,148],"attacks;":[54,149],"wherein":[55],"generated":[57],"UAP":[58],"causes":[59],"DNN":[61,134],"classify":[63],"an":[64,125],"input":[65],"into":[66],"specific":[68],"class.":[69],"However,":[70],"development":[72],"attacks":[77],"has":[78],"largely":[79],"fallen":[80],"behind":[81],"non-targeted":[86,110],"Therefore,":[88],"we":[89,151],"propose":[90],"simple":[92,105],"iterative":[93,106],"method":[94,102,107,117,131],"generate":[96],"Our":[101],"combines":[103],"and":[112,139],"fast":[114],"gradient":[115],"sign":[116],"input.":[126],"We":[127],"applied":[128],"proposed":[130],"state-of-the-art":[133],"models":[135],"image":[137],"proved":[140],"existence":[142],"almost":[144],"imperceptible":[145],"further,":[150],"demonstrated":[152],"such":[154],"easily":[158],"generated.":[159]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2019-11-22T00:00:00"}
