{"id":"https://openalex.org/W4390912484","doi":"https://doi.org/10.3390/bdcc8010008","title":"Evaluating the Robustness of Deep Learning Models against Adversarial Attacks: An Analysis with FGSM, PGD and CW","display_name":"Evaluating the Robustness of Deep Learning Models against Adversarial Attacks: An Analysis with FGSM, PGD and CW","publication_year":2024,"publication_date":"2024-01-16","ids":{"openalex":"https://openalex.org/W4390912484","doi":"https://doi.org/10.3390/bdcc8010008"},"language":"en","primary_location":{"id":"doi:10.3390/bdcc8010008","is_oa":true,"landing_page_url":"https://doi.org/10.3390/bdcc8010008","pdf_url":"https://www.mdpi.com/2504-2289/8/1/8/pdf?version=1705385863","source":{"id":"https://openalex.org/S4210238752","display_name":"Big Data and Cognitive Computing","issn_l":"2504-2289","issn":["2504-2289"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Big Data and Cognitive Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2504-2289/8/1/8/pdf?version=1705385863","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033572800","display_name":"William Villegas-Ch","orcid":"https://orcid.org/0000-0002-5421-7710"},"institutions":[{"id":"https://openalex.org/I4210102282","display_name":"Universidad de Las Am\u00e9ricas","ror":"https://ror.org/0198j4566","country_code":"EC","type":"education","lineage":["https://openalex.org/I4210102282"]}],"countries":["EC"],"is_corresponding":true,"raw_author_name":"William Villegas-Ch","raw_affiliation_strings":["Escuela de Ingenier\u00eda en Ciberseguridad, Facultad de Ingenier\u00edas Ciencias Aplicadas, Universidad de Las Am\u00e9ricas, Quito 170125, Ecuador"],"affiliations":[{"raw_affiliation_string":"Escuela de Ingenier\u00eda en Ciberseguridad, Facultad de Ingenier\u00edas Ciencias Aplicadas, Universidad de Las Am\u00e9ricas, Quito 170125, Ecuador","institution_ids":["https://openalex.org/I4210102282"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023599917","display_name":"\u00c1ngel Jaramillo-Alc\u00e1zar","orcid":"https://orcid.org/0000-0003-4143-2515"},"institutions":[{"id":"https://openalex.org/I4210102282","display_name":"Universidad de Las Am\u00e9ricas","ror":"https://ror.org/0198j4566","country_code":"EC","type":"education","lineage":["https://openalex.org/I4210102282"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"Angel Jaramillo-Alc\u00e1zar","raw_affiliation_strings":["Escuela de Ingenier\u00eda en Ciberseguridad, Facultad de Ingenier\u00edas Ciencias Aplicadas, Universidad de Las Am\u00e9ricas, Quito 170125, Ecuador"],"affiliations":[{"raw_affiliation_string":"Escuela de Ingenier\u00eda en Ciberseguridad, Facultad de Ingenier\u00edas Ciencias Aplicadas, Universidad de Las Am\u00e9ricas, Quito 170125, Ecuador","institution_ids":["https://openalex.org/I4210102282"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088265373","display_name":"Sergio Luj\u00e1n\u2010Mora","orcid":"https://orcid.org/0000-0001-5000-864X"},"institutions":[{"id":"https://openalex.org/I130194489","display_name":"University of Alicante","ror":"https://ror.org/05t8bcz72","country_code":"ES","type":"education","lineage":["https://openalex.org/I130194489"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Sergio Luj\u00e1n-Mora","raw_affiliation_strings":["Departamento de Lenguajes y Sistemas Inform\u00e1ticos, Universidad de Alicante, 03690 Alicante, Spain"],"affiliations":[{"raw_affiliation_string":"Departamento de Lenguajes y Sistemas Inform\u00e1ticos, Universidad de Alicante, 03690 Alicante, Spain","institution_ids":["https://openalex.org/I130194489"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5033572800"],"corresponding_institution_ids":["https://openalex.org/I4210102282"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":12.9771,"has_fulltext":true,"cited_by_count":38,"citation_normalized_percentile":{"value":0.98967327,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"8","issue":"1","first_page":"8","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9671000242233276,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7482323050498962},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.698979377746582},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6869139671325684},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6527549624443054},{"id":"https://openalex.org/keywords/gradient-descent","display_name":"Gradient descent","score":0.5628702640533447},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.510868489742279},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4975135624408722},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3225993514060974},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28678643703460693},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.14652320742607117}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7482323050498962},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.698979377746582},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6869139671325684},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6527549624443054},{"id":"https://openalex.org/C153258448","wikidata":"https://www.wikidata.org/wiki/Q1199743","display_name":"Gradient descent","level":3,"score":0.5628702640533447},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.510868489742279},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4975135624408722},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3225993514060974},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28678643703460693},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.14652320742607117},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/bdcc8010008","is_oa":true,"landing_page_url":"https://doi.org/10.3390/bdcc8010008","pdf_url":"https://www.mdpi.com/2504-2289/8/1/8/pdf?version=1705385863","source":{"id":"https://openalex.org/S4210238752","display_name":"Big Data and Cognitive Computing","issn_l":"2504-2289","issn":["2504-2289"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Big Data and Cognitive Computing","raw_type":"journal-article"},{"id":"pmh:oai:rua.ua.es:10045/139780","is_oa":true,"landing_page_url":"http://hdl.handle.net/10045/139780","pdf_url":"http://rua.ua.es/dspace/bitstream/10045/139780/1/Villegas-Ch_etal_2024_BigDataCognComput.pdf","source":{"id":"https://openalex.org/S4306400416","display_name":"Repositorio Institucional de la Universidad de Alicante (Universidad de Alicante)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130194489","host_organization_name":"University of Alicante","host_organization_lineage":["https://openalex.org/I130194489"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:doaj.org/article:88b05e1082b747319eb14c77421915ef","is_oa":true,"landing_page_url":"https://doaj.org/article/88b05e1082b747319eb14c77421915ef","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Big Data and Cognitive Computing, Vol 8, Iss 1, p 8 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/bdcc8010008","is_oa":true,"landing_page_url":"https://doi.org/10.3390/bdcc8010008","pdf_url":"https://www.mdpi.com/2504-2289/8/1/8/pdf?version=1705385863","source":{"id":"https://openalex.org/S4210238752","display_name":"Big Data and Cognitive Computing","issn_l":"2504-2289","issn":["2504-2289"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Big Data and Cognitive Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4390912484.pdf"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W2056765730","https://openalex.org/W2080323694","https://openalex.org/W2640329709","https://openalex.org/W2786118190","https://openalex.org/W2945645805","https://openalex.org/W2946313841","https://openalex.org/W2963366334","https://openalex.org/W2979630692","https://openalex.org/W2981374454","https://openalex.org/W2997532515","https://openalex.org/W3007834030","https://openalex.org/W3016098132","https://openalex.org/W3018666070","https://openalex.org/W3022012431","https://openalex.org/W3048024323","https://openalex.org/W3066878117","https://openalex.org/W3081271317","https://openalex.org/W3097199060","https://openalex.org/W3105389675","https://openalex.org/W3114237205","https://openalex.org/W3114914362","https://openalex.org/W3120057955","https://openalex.org/W3128513745","https://openalex.org/W3174969113","https://openalex.org/W3193450951","https://openalex.org/W3196389253","https://openalex.org/W3196506678","https://openalex.org/W3196874059","https://openalex.org/W3200113267","https://openalex.org/W3200273875","https://openalex.org/W3208530873","https://openalex.org/W3211751213","https://openalex.org/W3215605706","https://openalex.org/W4224316098","https://openalex.org/W4281723839","https://openalex.org/W4291915104","https://openalex.org/W4293277320","https://openalex.org/W4294243404","https://openalex.org/W4295681311","https://openalex.org/W4297094744","https://openalex.org/W4298217332","https://openalex.org/W4309190991","https://openalex.org/W4312754966","https://openalex.org/W6776522872","https://openalex.org/W6788267565","https://openalex.org/W6839024986"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W4246396837","https://openalex.org/W2482350142","https://openalex.org/W3176240006","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4288019534","https://openalex.org/W4310988119"],"abstract_inverted_index":{"This":[0,131],"study":[1],"evaluated":[2],"the":[3,9,22,27,33,40,48,67,73,80,84,111,115,122,134,138,149,161,194,200,218],"generation":[4],"of":[5,12,113,117,136,151,163],"adversarial":[6,62,129,164],"examples":[7],"and":[8,32,35,43,86,100,121,155,174,205,210,220],"subsequent":[10],"robustness":[11],"an":[13,177,211],"image":[14,53,98,156],"classification":[15,50],"model.":[16],"The":[17,64],"attacks":[18],"were":[19,56,103],"performed":[20],"using":[21],"Fast":[23,74,201],"Gradient":[24,29,75,202,207],"Sign":[25],"method,":[26,31],"Projected":[28,206],"Descent":[30,208],"Carlini":[34,85,219],"Wagner":[36,87,221],"attack":[37],"to":[38,70,124,159,170,199],"perturb":[39],"original":[41,81],"images":[42],"analyze":[44],"their":[45],"impact":[46],"on":[47],"model\u2019s":[49,68],"accuracy.":[51],"Additionally,":[52],"manipulation":[54,157],"techniques":[55,158],"investigated":[57],"as":[58,95,105],"defensive":[59],"measures":[60],"against":[61,128],"attacks.":[63,165],"results":[65],"highlighted":[66],"vulnerability":[69,116],"conflicting":[71],"examples:":[72],"Signed":[76,203],"Method":[77,204],"effectively":[78],"altered":[79],"classifications,":[82],"while":[83],"method":[88],"proved":[89],"less":[90],"effective.":[91],"Promising":[92],"approaches":[93],"such":[94],"noise":[96],"reduction,":[97],"compression,":[99],"Gaussian":[101],"blurring":[102],"presented":[104],"effective":[106,153],"countermeasures.":[107],"These":[108,166],"findings":[109],"underscore":[110],"importance":[112],"addressing":[114,137],"machine":[118,145],"learning":[119,146],"models":[120],"need":[123],"develop":[125],"robust":[126],"defenses":[127],"examples.":[130],"article":[132],"emphasizes":[133],"urgency":[135],"threat":[139],"posed":[140],"by":[141,180],"harmful":[142],"standards":[143],"in":[144,176,189],"models,":[147],"highlighting":[148],"relevance":[150],"implementing":[152],"countermeasures":[154],"mitigate":[160],"effects":[162],"efforts":[167],"are":[168],"crucial":[169],"safeguarding":[171],"model":[172,196],"integrity":[173],"trust":[175],"environment":[178],"marked":[179],"constantly":[181],"evolving":[182],"hostile":[183],"threats.":[184],"An":[185],"average":[186],"25%":[187],"decrease":[188,216],"accuracy":[190],"was":[191],"observed":[192],"for":[193],"VGG16":[195],"when":[197],"exposed":[198],"attacks,":[209],"even":[212],"more":[213],"significant":[214],"35%":[215],"with":[217],"method.":[222]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":25},{"year":2024,"cited_by_count":7}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
