{"id":"https://openalex.org/W4409896696","doi":"https://doi.org/10.3390/bdcc9050114","title":"From Accuracy to Vulnerability: Quantifying the Impact of Adversarial Perturbations on Healthcare AI Models","display_name":"From Accuracy to Vulnerability: Quantifying the Impact of Adversarial Perturbations on Healthcare AI Models","publication_year":2025,"publication_date":"2025-04-27","ids":{"openalex":"https://openalex.org/W4409896696","doi":"https://doi.org/10.3390/bdcc9050114"},"language":"en","primary_location":{"id":"doi:10.3390/bdcc9050114","is_oa":true,"landing_page_url":"https://doi.org/10.3390/bdcc9050114","pdf_url":"https://www.mdpi.com/2504-2289/9/5/114/pdf?version=1745742231","source":{"id":"https://openalex.org/S4210238752","display_name":"Big Data and Cognitive Computing","issn_l":"2504-2289","issn":["2504-2289"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Big Data and Cognitive Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2504-2289/9/5/114/pdf?version=1745742231","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071296570","display_name":"Sarfraz Nawaz Brohi","orcid":null},"institutions":[{"id":"https://openalex.org/I178535277","display_name":"University of the West of England","ror":"https://ror.org/02nwg5t34","country_code":"GB","type":"education","lineage":["https://openalex.org/I178535277"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Sarfraz Brohi","raw_affiliation_strings":["School of Computing and Creative Technologies, University of the West of England, Bristol BS16 1QY, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing and Creative Technologies, University of the West of England, Bristol BS16 1QY, UK","institution_ids":["https://openalex.org/I178535277"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012333418","display_name":"Qurat-ul-ain Mastoi","orcid":"https://orcid.org/0000-0001-8009-6580"},"institutions":[{"id":"https://openalex.org/I178535277","display_name":"University of the West of England","ror":"https://ror.org/02nwg5t34","country_code":"GB","type":"education","lineage":["https://openalex.org/I178535277"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Qurat-ul-ain Mastoi","raw_affiliation_strings":["School of Computing and Creative Technologies, University of the West of England, Bristol BS16 1QY, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing and Creative Technologies, University of the West of England, Bristol BS16 1QY, UK","institution_ids":["https://openalex.org/I178535277"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5071296570"],"corresponding_institution_ids":["https://openalex.org/I178535277"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":11.1421,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.97912137,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"9","issue":"5","first_page":"114","last_page":"114"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9549999833106995,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9516000151634216,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7831236124038696},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6897916793823242},{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.5688560605049133},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.44813239574432373},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4457531273365021},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.35109877586364746},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3461908996105194},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24673554301261902},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.22871825098991394},{"id":"https://openalex.org/keywords/psychiatry","display_name":"Psychiatry","score":0.14730525016784668},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.08217006921768188},{"id":"https://openalex.org/keywords/psychological-intervention","display_name":"Psychological intervention","score":0.06731614470481873}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7831236124038696},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6897916793823242},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.5688560605049133},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.44813239574432373},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4457531273365021},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.35109877586364746},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3461908996105194},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24673554301261902},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.22871825098991394},{"id":"https://openalex.org/C118552586","wikidata":"https://www.wikidata.org/wiki/Q7867","display_name":"Psychiatry","level":1,"score":0.14730525016784668},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.08217006921768188},{"id":"https://openalex.org/C27415008","wikidata":"https://www.wikidata.org/wiki/Q7256382","display_name":"Psychological intervention","level":2,"score":0.06731614470481873}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/bdcc9050114","is_oa":true,"landing_page_url":"https://doi.org/10.3390/bdcc9050114","pdf_url":"https://www.mdpi.com/2504-2289/9/5/114/pdf?version=1745742231","source":{"id":"https://openalex.org/S4210238752","display_name":"Big Data and Cognitive Computing","issn_l":"2504-2289","issn":["2504-2289"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Big Data and Cognitive Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3be3b66252c54f7a999d9c1a538aeacd","is_oa":true,"landing_page_url":"https://doaj.org/article/3be3b66252c54f7a999d9c1a538aeacd","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Big Data and Cognitive Computing, Vol 9, Iss 5, p 114 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/bdcc9050114","is_oa":true,"landing_page_url":"https://doi.org/10.3390/bdcc9050114","pdf_url":"https://www.mdpi.com/2504-2289/9/5/114/pdf?version=1745742231","source":{"id":"https://openalex.org/S4210238752","display_name":"Big Data and Cognitive Computing","issn_l":"2504-2289","issn":["2504-2289"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Big Data and Cognitive Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4409896696.pdf","grobid_xml":"https://content.openalex.org/works/W4409896696.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W1985511977","https://openalex.org/W2051267297","https://openalex.org/W2065281378","https://openalex.org/W2243397390","https://openalex.org/W2461943168","https://openalex.org/W2607219512","https://openalex.org/W2765424254","https://openalex.org/W2811973125","https://openalex.org/W2924551358","https://openalex.org/W2962700793","https://openalex.org/W2962763344","https://openalex.org/W2963178695","https://openalex.org/W2963303354","https://openalex.org/W2963542245","https://openalex.org/W2963857521","https://openalex.org/W2964082701","https://openalex.org/W3102720581","https://openalex.org/W3103557498","https://openalex.org/W4205228770","https://openalex.org/W4247200422","https://openalex.org/W4386141748","https://openalex.org/W4386858931","https://openalex.org/W4387617233","https://openalex.org/W4401423311","https://openalex.org/W4404484023","https://openalex.org/W4406153545","https://openalex.org/W4408008526","https://openalex.org/W6752934900","https://openalex.org/W6946075548"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W1756374135","https://openalex.org/W2062873522","https://openalex.org/W2947584067","https://openalex.org/W2280562859","https://openalex.org/W230721595","https://openalex.org/W3157230915","https://openalex.org/W1496728123","https://openalex.org/W2789975780"],"abstract_inverted_index":{"As":[0],"AI":[1,135,142,155,166,185],"becomes":[2],"indispensable":[3],"in":[4,31,110,186],"healthcare,":[5],"its":[6,54],"vulnerability":[7],"to":[8,17,28,91,102,106,177],"adversarial":[9,60,125],"attacks":[10],"demands":[11],"serious":[12],"attention.":[13],"Even":[14],"minimal":[15],"changes":[16],"the":[18,71,97,111,117,130,138,150,165,174,179],"input":[19],"data":[20],"can":[21,127],"mislead":[22],"Deep":[23],"Learning":[24],"(DL)":[25],"models,":[26],"leading":[27],"critical":[29],"errors":[30],"diagnosis":[32],"and":[33,52,104,172,182],"endangering":[34],"patient":[35],"safety.":[36],"In":[37],"this":[38],"study,":[39],"we":[40,65],"developed":[41],"an":[42,82,124],"optimized":[43,83],"Multi-layer":[44],"Perceptron":[45],"(MLP)":[46],"model":[47,85,175],"for":[48,87,152],"breast":[49,88],"cancer":[50,89],"classification":[51,112],"exposed":[53],"cybersecurity":[55,145,159],"vulnerabilities":[56],"through":[57],"a":[58,67,74,107,133],"real-world-inspired":[59],"attack.":[61],"Unlike":[62],"prior":[63],"studies,":[64],"conducted":[66],"quantitative":[68],"evaluation":[69],"on":[70,81],"impact":[72],"of":[73,132,140,164,184],"Fast":[75],"Gradient":[76],"Sign":[77],"Method":[78],"(FGSM)":[79],"attack":[80,126],"DL":[84],"designed":[86],"detection":[90],"demonstrate":[92,122],"how":[93,123],"minor":[94],"perturbations":[95],"reduced":[96],"model\u2019s":[98],"accuracy":[99],"from":[100],"98%":[101],"53%,":[103],"led":[105],"substantial":[108],"increase":[109],"errors,":[113],"as":[114],"revealed":[115],"by":[116,156],"confusion":[118],"matrix.":[119],"Our":[120],"findings":[121],"significantly":[128],"compromise":[129],"performance":[131],"healthcare":[134,188],"model,":[136],"underscoring":[137],"importance":[139],"aligning":[141],"development":[143,167],"with":[144],"readiness.":[146],"This":[147],"research":[148],"highlights":[149],"demand":[151],"designing":[153],"resilient":[154],"integrating":[157],"rigorous":[158],"practices":[160],"at":[161],"every":[162],"stage":[163],"lifecycle,":[168],"i.e.,":[169],"before,":[170],"during,":[171],"after":[173],"engineering":[176],"prioritize":[178],"effectiveness,":[180],"accuracy,":[181],"safety":[183],"real-world":[187],"environments.":[189]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
