Detailed Information

Cited 1 time in webofscience Cited 1 time in scopus
Metadata Downloads

Practical Adversarial Attacks Imperceptible to Humans in Visual Recognition

Full metadata record
DC Field Value Language
dc.contributor.authorPark, Donghyeok-
dc.contributor.authorYeon, Sumin-
dc.contributor.authorSeo, Hyeon-
dc.contributor.authorBuu, Seok-Jun-
dc.contributor.authorLee, Suwon-
dc.date.accessioned2025-03-13T05:00:18Z-
dc.date.available2025-03-13T05:00:18Z-
dc.date.issued2025-02-
dc.identifier.issn1526-1492-
dc.identifier.issn1526-1506-
dc.identifier.urihttps://scholarworks.gnu.ac.kr/handle/sw.gnu/77420-
dc.description.abstractRecent research on adversarial attacks has primarily focused on white-box attack techniques, with limited exploration of black-box attack methods. Furthermore, in many black-box research scenarios, it is assumed that the output label and probability distribution can be observed without imposing any constraints on the number of attack attempts. Unfortunately, this disregard for the real-world practicality of attacks, particularly their potential for human detectability, has left a gap in the research landscape. Considering these limitations, our study focuses on using a similar color attack method, assuming access only to the output label, limiting the number of attack attempts to 100, and subjecting the attacks to human perceptibility testing. Through this approach, we demonstrated the effectiveness black box attack techniques in deceiving models and achieved a success rate of 82.68% in deceiving humans. This study emphasizes the significance of research that addresses the challenge of deceiving both humans and models, highlighting the importance of real-world applicability.-
dc.format.extent13-
dc.language영어-
dc.language.isoENG-
dc.publisherTech Science Press-
dc.titlePractical Adversarial Attacks Imperceptible to Humans in Visual Recognition-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.32604/cmes.2025.061732-
dc.identifier.scopusid2-s2.0-105000657841-
dc.identifier.wosid001434673800001-
dc.identifier.bibliographicCitationCMES - Computer Modeling in Engineering and Sciences, v.142, no.3, pp 2725 - 2737-
dc.citation.titleCMES - Computer Modeling in Engineering and Sciences-
dc.citation.volume142-
dc.citation.number3-
dc.citation.startPage2725-
dc.citation.endPage2737-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaMathematics-
dc.relation.journalWebOfScienceCategoryEngineering, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryMathematics, Interdisciplinary Applications-
dc.subject.keywordAuthorAdversarial attacks-
dc.subject.keywordAuthorimage recognition-
dc.subject.keywordAuthorinformation security-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Su Won photo

Lee, Su Won
IT공과대학 (컴퓨터공학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE