{"id":"https://openalex.org/W7118698146","doi":"https://doi.org/10.48550/arxiv.2601.00270","title":"Rectifying Adversarial Examples Using Their Vulnerabilities","display_name":"Rectifying Adversarial Examples Using Their Vulnerabilities","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7118698146","doi":"https://doi.org/10.48550/arxiv.2601.00270"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.00270","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.00270","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.00270","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5094099267","display_name":"Fumiya Morimoto","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Morimoto, Fumiya","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116569938","display_name":"Ryuto Morita","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Morita, Ryuto","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5121819893","display_name":"Satoshi Ono","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ono, Satoshi","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5094099267"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.0008999999845400453,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.0006000000284984708,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6543999910354614},{"id":"https://openalex.org/keywords/sample","display_name":"Sample (material)","score":0.5390999913215637},{"id":"https://openalex.org/keywords/categorization","display_name":"Categorization","score":0.5285000205039978},{"id":"https://openalex.org/keywords/stability","display_name":"Stability (learning theory)","score":0.4571000039577484},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4424999952316284},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.44020000100135803},{"id":"https://openalex.org/keywords/boundary","display_name":"Boundary (topology)","score":0.3619999885559082}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7103999853134155},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6543999910354614},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5600000023841858},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.5390999913215637},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.5285000205039978},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4964999854564667},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.4571000039577484},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4424999952316284},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.44020000100135803},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3995000123977661},{"id":"https://openalex.org/C62354387","wikidata":"https://www.wikidata.org/wiki/Q875399","display_name":"Boundary (topology)","level":2,"score":0.3619999885559082},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.3361000120639801},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.33500000834465027},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.31060001254081726},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.303600013256073},{"id":"https://openalex.org/C50942859","wikidata":"https://www.wikidata.org/wiki/Q4967193","display_name":"Rectification","level":3,"score":0.2989000082015991},{"id":"https://openalex.org/C139676723","wikidata":"https://www.wikidata.org/wiki/Q1193832","display_name":"Sign (mathematics)","level":2,"score":0.29750001430511475},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.28049999475479126},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.25949999690055847},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.25609999895095825}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.00270","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.00270","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.00270","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.00270","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.7230614423751831,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Deep":[0],"neural":[1],"network-based":[2],"classifiers":[3],"are":[4,14],"prone":[5],"to":[6,20,25,34,101,108,124,154],"errors":[7],"when":[8],"processing":[9],"adversarial":[10],"examples":[11],"(AEs).":[12],"AEs":[13,49,107,123,143,157,185,216],"minimally":[15,141],"perturbed":[16],"input":[17,53,85,233],"data":[18],"undetectable":[19],"humans":[21],"posing":[22],"significant":[23],"risks":[24],"security-dependent":[26],"applications.":[27],"Hence,":[28],"extensive":[29],"research":[30],"has":[31],"been":[32],"undertaken":[33],"develop":[35],"defense":[36],"mechanisms":[37],"that":[38,207],"mitigate":[39],"their":[40,114],"threats.":[41],"Most":[42],"existing":[43],"methods":[44,235],"primarily":[45],"focus":[46],"on":[47,51,76,121],"discriminating":[48],"based":[50,120],"the":[52,61,82,110,128,137,166,188,197,208],"sample":[54,63],"features,":[55],"emphasizing":[56],"AE":[57],"detection":[58],"without":[59],"addressing":[60,136],"correct":[62,83,111],"categorization":[64],"before":[65],"an":[66],"attack.":[67],"While":[68],"some":[69],"tasks":[70],"may":[71],"only":[72,183],"require":[73],"mere":[74],"rejection":[75],"detected":[77],"AEs,":[78],"others":[79],"necessitate":[80],"identifying":[81],"original":[84,115],"category":[86],"such":[87],"as":[88,186],"traffic":[89],"sign":[90],"recognition":[91],"in":[92,214,236],"autonomous":[93],"driving.":[94],"The":[95],"objective":[96],"of":[97,113,139,182,199,238],"this":[98],"study":[99],"is":[100,119],"propose":[102],"a":[103,163,179],"method":[104,118,190,210],"for":[105,131],"rectifying":[106,140,156,215],"estimate":[109],"labels":[112],"inputs.":[116],"Our":[117],"re-attacking":[122],"move":[125],"them":[126],"beyond":[127],"decision":[129],"boundary":[130],"accurate":[132],"label":[133],"prediction,":[134],"effectively":[135,155],"issue":[138],"perceptible":[142],"created":[144],"using":[145],"white-box":[146],"attack":[147,220],"methods.":[148],"However,":[149],"challenge":[150],"remains":[151],"with":[152],"respect":[153],"produced":[158],"by":[159,174],"black-box":[160,225],"attacks":[161,194],"at":[162],"distance":[164],"from":[165],"boundary,":[167],"or":[168,202],"those":[169],"misclassified":[170],"into":[171],"low-confidence":[172],"categories":[173],"targeted":[175,223],"attacks.":[176,226,242],"By":[177],"adopting":[178],"straightforward":[180],"approach":[181],"considering":[184],"inputs,":[187],"proposed":[189,209],"can":[191],"address":[192],"diverse":[193],"while":[195],"avoiding":[196],"requirement":[198],"parameter":[200],"adjustments":[201],"preliminary":[203],"training.":[204],"Results":[205],"demonstrate":[206],"exhibits":[211],"consistent":[212],"performance":[213],"generated":[217],"via":[218],"various":[219,241],"methods,":[221],"including":[222],"and":[224,232],"Moreover,":[227],"it":[228],"outperforms":[229],"conventional":[230],"rectification":[231],"transformation":[234],"terms":[237],"stability":[239],"against":[240]},"counts_by_year":[],"updated_date":"2026-01-08T20:10:11.968330","created_date":"2026-01-08T00:00:00"}
