Cited 0 time in
Mitigating Adversarial Attack through Randomization Techniques and Image Smoothing
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Kim, Hyeong-Gyeong | - |
| dc.contributor.author | Choi, Sang-Min | - |
| dc.contributor.author | Seo, Hyeon | - |
| dc.contributor.author | Lee, Suwon | - |
| dc.date.accessioned | 2025-09-10T04:30:16Z | - |
| dc.date.available | 2025-09-10T04:30:16Z | - |
| dc.date.issued | 2025-07 | - |
| dc.identifier.issn | 1546-2218 | - |
| dc.identifier.issn | 1546-2226 | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/80006 | - |
| dc.description.abstract | Adversarial attacks pose a significant threat to artificial intelligence systems by exposing them to vulnerabilities in deep learning models. Existing defense mechanisms often suffer drawbacks, such as the need for model retraining, significant inference time overhead, and limited effectiveness against specific attack types. Achieving perfect defense against adversarial attacks remains elusive, emphasizing the importance of mitigation strategies. In this study, we propose a defense mechanism that applies random cropping and Gaussian filtering to input images to mitigate the impact of adversarial attacks. First, the image was randomly cropped to vary its dimensions and then placed at the center of a fixed 299 x 299 space, with the remaining areas filled with zero padding. Subsequently, Gaussian filtering with a 7 x 7 kernel and a standard deviation of two was applied using a convolution operation. Finally, the smoothed image was fed into the classification model. The proposed defense method consistently appeared in the upper-right region across all attack scenarios, demonstrating its ability to preserve classification performance on clean images while significantly mitigating adversarial attacks. This visualization confirms that the proposed method is effective and reliable for defending against adversarial perturbations. Moreover, the proposed method incurs minimal computational overhead, making it suitable for real-time applications. Furthermore, owing to its model-agnostic nature, the proposed method can be easily incorporated into various neural network architectures, serving as a fundamental module for adversarial defense strategies. | - |
| dc.format.extent | 17 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Tech Science Press | - |
| dc.title | Mitigating Adversarial Attack through Randomization Techniques and Image Smoothing | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.32604/cmc.2025.067024 | - |
| dc.identifier.scopusid | 2-s2.0-105014205191 | - |
| dc.identifier.wosid | 001545981500001 | - |
| dc.identifier.bibliographicCitation | Computers, Materials and Continua, v.84, no.3, pp 4381 - 4397 | - |
| dc.citation.title | Computers, Materials and Continua | - |
| dc.citation.volume | 84 | - |
| dc.citation.number | 3 | - |
| dc.citation.startPage | 4381 | - |
| dc.citation.endPage | 4397 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Materials Science | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.relation.journalWebOfScienceCategory | Materials Science, Multidisciplinary | - |
| dc.subject.keywordAuthor | Adversarial attacks | - |
| dc.subject.keywordAuthor | deep learning | - |
| dc.subject.keywordAuthor | artificial intelligence systems | - |
| dc.subject.keywordAuthor | random cropping | - |
| dc.subject.keywordAuthor | Gaussian filtering | - |
| dc.subject.keywordAuthor | image smoothing | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0532
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
