Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Mitigating Adversarial Attack through Randomization Techniques and Image Smoothing

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Hyeong-Gyeong-
dc.contributor.authorChoi, Sang-Min-
dc.contributor.authorSeo, Hyeon-
dc.contributor.authorLee, Suwon-
dc.date.accessioned2025-09-10T04:30:16Z-
dc.date.available2025-09-10T04:30:16Z-
dc.date.issued2025-07-
dc.identifier.issn1546-2218-
dc.identifier.issn1546-2226-
dc.identifier.urihttps://scholarworks.gnu.ac.kr/handle/sw.gnu/80006-
dc.description.abstractAdversarial attacks pose a significant threat to artificial intelligence systems by exposing them to vulnerabilities in deep learning models. Existing defense mechanisms often suffer drawbacks, such as the need for model retraining, significant inference time overhead, and limited effectiveness against specific attack types. Achieving perfect defense against adversarial attacks remains elusive, emphasizing the importance of mitigation strategies. In this study, we propose a defense mechanism that applies random cropping and Gaussian filtering to input images to mitigate the impact of adversarial attacks. First, the image was randomly cropped to vary its dimensions and then placed at the center of a fixed 299 x 299 space, with the remaining areas filled with zero padding. Subsequently, Gaussian filtering with a 7 x 7 kernel and a standard deviation of two was applied using a convolution operation. Finally, the smoothed image was fed into the classification model. The proposed defense method consistently appeared in the upper-right region across all attack scenarios, demonstrating its ability to preserve classification performance on clean images while significantly mitigating adversarial attacks. This visualization confirms that the proposed method is effective and reliable for defending against adversarial perturbations. Moreover, the proposed method incurs minimal computational overhead, making it suitable for real-time applications. Furthermore, owing to its model-agnostic nature, the proposed method can be easily incorporated into various neural network architectures, serving as a fundamental module for adversarial defense strategies.-
dc.format.extent17-
dc.language영어-
dc.language.isoENG-
dc.publisherTech Science Press-
dc.titleMitigating Adversarial Attack through Randomization Techniques and Image Smoothing-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.32604/cmc.2025.067024-
dc.identifier.scopusid2-s2.0-105014205191-
dc.identifier.wosid001545981500001-
dc.identifier.bibliographicCitationComputers, Materials and Continua, v.84, no.3, pp 4381 - 4397-
dc.citation.titleComputers, Materials and Continua-
dc.citation.volume84-
dc.citation.number3-
dc.citation.startPage4381-
dc.citation.endPage4397-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaMaterials Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryMaterials Science, Multidisciplinary-
dc.subject.keywordAuthorAdversarial attacks-
dc.subject.keywordAuthordeep learning-
dc.subject.keywordAuthorartificial intelligence systems-
dc.subject.keywordAuthorrandom cropping-
dc.subject.keywordAuthorGaussian filtering-
dc.subject.keywordAuthorimage smoothing-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Su Won photo

Lee, Su Won
IT공과대학 (컴퓨터공학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE