{"id":"https://openalex.org/W4390189187","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361358","title":"Adversarial Patch Attacks Against Aerial Imagery Object Detectors Based on Interpretable Guidance","display_name":"Adversarial Patch Attacks Against Aerial Imagery Object Detectors Based on Interpretable Guidance","publication_year":2023,"publication_date":"2023-11-14","ids":{"openalex":"https://openalex.org/W4390189187","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361358"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361358","pdf_url":null,"source":{"id":"https://openalex.org/S4363605881","display_name":"2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014484311","display_name":"Fengyi Liu","orcid":"https://orcid.org/0000-0002-9996-5616"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"funder","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengyi Liu","raw_affiliation_strings":["School of Cyberspace Security, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016645765","display_name":"Zhichao Lian","orcid":"https://orcid.org/0000-0002-6643-8975"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"funder","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhichao Lian","raw_affiliation_strings":["School of Cyberspace Security, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":66},"biblio":{"volume":null,"issue":null,"first_page":"0200","last_page":"0207"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9566,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.9263,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.87743974},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness","score":0.75900304},{"id":"https://openalex.org/keywords/transferability","display_name":"Transferability","score":0.69780344},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep Neural Networks","score":0.62689716}],"concepts":[{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.87743974},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.85321546},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.75900304},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6981854},{"id":"https://openalex.org/C61272859","wikidata":"https://www.wikidata.org/wiki/Q7834031","display_name":"Transferability","level":3,"score":0.69780344},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.63056695},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.62689716},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.54604983},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5198327},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.50587696},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.48729384},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.39133713},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C140331021","wikidata":"https://www.wikidata.org/wiki/Q1868104","display_name":"Logit","level":2,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361358","pdf_url":null,"source":{"id":"https://openalex.org/S4363605881","display_name":"2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China","award_id":"2021YFF0602104-2"}],"datasets":[],"versions":[],"referenced_works_count":35,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W1673923490","https://openalex.org/W1686810756","https://openalex.org/W1836465849","https://openalex.org/W1945616565","https://openalex.org/W2183182206","https://openalex.org/W2183341477","https://openalex.org/W2243397390","https://openalex.org/W2295107390","https://openalex.org/W2329627532","https://openalex.org/W2570343428","https://openalex.org/W2604505099","https://openalex.org/W2618530766","https://openalex.org/W2741951152","https://openalex.org/W2775467454","https://openalex.org/W2902110905","https://openalex.org/W2953610242","https://openalex.org/W2962749812","https://openalex.org/W2962858109","https://openalex.org/W2963542991","https://openalex.org/W2963726920","https://openalex.org/W2963857521","https://openalex.org/W2965198951","https://openalex.org/W3035232208","https://openalex.org/W3088678766","https://openalex.org/W3096750792","https://openalex.org/W3098722327","https://openalex.org/W3105806188","https://openalex.org/W3168321395","https://openalex.org/W3194110702","https://openalex.org/W3206814941","https://openalex.org/W3208515396","https://openalex.org/W4248710273","https://openalex.org/W4293584584","https://openalex.org/W639708223"],"related_works":["https://openalex.org/W4392340763","https://openalex.org/W4377864639","https://openalex.org/W4288055406","https://openalex.org/W4283325551","https://openalex.org/W4226402597","https://openalex.org/W4200630034","https://openalex.org/W3137894200","https://openalex.org/W3132910851","https://openalex.org/W3092178728","https://openalex.org/W2997056298"],"abstract_inverted_index":{"Although":[0],"image":[1],"recognition":[2],"and":[3,23,84,103,113,117,135,175,228],"classification":[4],"methods":[5,126],"based":[6,121],"on":[7],"deep":[8,90],"neural":[9,91],"networks":[10],"(DNNs)":[11],"have":[12,35],"accomplished":[13],"remarkable":[14],"achievements":[15],"in":[16,26,50,70,239],"the":[17,51,56,86,115,130,133,149,156,160,166,171,197,207,210,220,235,240,243],"domain":[18],"of":[19,53,58,89,119,132,163,209,222,237,245],"computer":[20],"vision,":[21],"more":[22,24],"research":[25],"recent":[27],"years":[28],"has":[29],"shown":[30],"that":[31,37,201,230],"these":[32],"models":[33],"may":[34,97],"vulnerabilities":[36],"can":[38,64,76],"be":[39,77],"easily":[40],"exploited":[41],"by":[42],"attackers,":[43],"leading":[44],"to":[45,80,99,111,142,154,186,218,233],"incorrect":[46],"output":[47,72,87,95],"results.":[48],"Especially":[49],"realm":[52],"object":[54],"detection,":[55],"incorporation":[57],"meticulously":[59],"crafted":[60],"patches":[61,75,224,232],"onto":[62],"images":[63],"potentially":[65],"deceive":[66],"DNN-based":[67],"detectors,":[68],"resulting":[69],"erroneous":[71],"outcomes.":[73],"These":[74,93],"carefully":[78],"designed":[79],"greatly":[81],"interfere":[82],"with":[83],"mislead":[85],"results":[88,96,194],"networks.":[92],"misleading":[94],"lead":[98],"serious":[100],"security":[101,118],"issues":[102],"losses,":[104],"so":[105],"it":[106,177],"is":[107],"becoming":[108],"increasingly":[109],"important":[110],"study":[112],"strengthen":[114],"robustness":[116],"DNNs":[120],"target":[122,211],"detectors.":[123],"However,":[124],"previous":[125],"did":[127],"not":[128],"consider":[129],"interpretability":[131],"model,":[134],"this":[136],"paper":[137],"proposes":[138],"a":[139,183],"new":[140],"mothed":[141],"adversarial":[143,223],"patch":[144,173],"attacks.":[145],"First,":[146],"we":[147,169,181,215],"employ":[148],"model":[150,241],"interpretable":[151],"algorithm":[152],"Grad-CAM":[153],"obtain":[155],"patch's":[157],"location":[158],"within":[159],"model's":[161],"region":[162],"interest":[164,238],"for":[165],"target.":[167],"Subsequently,":[168],"calculate":[170],"precise":[172],"placement":[174],"apply":[176],"accordingly.":[178],"Following":[179],"that,":[180],"utilize":[182],"loss":[184],"function":[185],"optimize":[187],"patch,":[188],"ensuring":[189],"its":[190],"effectiveness.":[191],"The":[192],"experimental":[193],"obtained":[195],"from":[196],"DOTA":[198],"dataset":[199],"indicate":[200],"our":[202],"proposed":[203],"method":[204],"effectively":[205],"degrades":[206],"performance":[208],"detection":[212],"model.":[213],"Secondly,":[214],"conducted":[216],"experiments":[217],"improve":[219],"transferability":[221,244],"across":[225],"different":[226],"models,":[227],"verified":[229],"using":[231],"cover":[234],"regions":[236],"improves":[242],"patches.":[246]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4390189187","counts_by_year":[],"updated_date":"2025-02-19T14:00:12.738405","created_date":"2023-12-26"}