{"id":"https://openalex.org/W4386556612","doi":"https://doi.org/10.48550/arxiv.2309.01452","title":"Toward Defensive Letter Design","display_name":"Toward Defensive Letter Design","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4386556612","doi":"https://doi.org/10.48550/arxiv.2309.01452"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2309.01452","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},"type":"preprint","type_crossref":"posted-content","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/abs/2309.01452","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109331870","display_name":"Rentaro Kataoka","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kataoka, Rentaro","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102267134","display_name":"Akisato Kimura","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kimura, Akisato","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5051387162","display_name":"Seiichi Uchida","orcid":"https://orcid.org/0000-0001-8592-7566"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Uchida, Seiichi","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":65},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9477,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11699","display_name":"High-Velocity Impact and Material Behavior","score":0.9349,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.47218266}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.88667065},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.69256645},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.64150745},{"id":"https://openalex.org/C2778143727","wikidata":"https://www.wikidata.org/wiki/Q1820650","display_name":"Readability","level":2,"score":0.6103369},{"id":"https://openalex.org/C2780861071","wikidata":"https://www.wikidata.org/wiki/Q1062934","display_name":"Character (mathematics)","level":2,"score":0.5991093},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5960465},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.4932639},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.47218266},{"id":"https://openalex.org/C139676723","wikidata":"https://www.wikidata.org/wiki/Q1193832","display_name":"Sign (mathematics)","level":2,"score":0.4177915},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4173763},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16830945},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13861749},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2309.01452","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/2309.01452","pdf_url":"http://arxiv.org/pdf/2309.01452","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":false,"landing_page_url":"https://api.datacite.org/dois/10.48550/arxiv.2309.01452","pdf_url":null,"source":{"id":"https://openalex.org/S4393179698","display_name":"DataCite API","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I4210145204","host_organization_name":"DataCite","host_organization_lineage":["https://openalex.org/I4210145204"],"host_organization_lineage_names":["DataCite"],"type":"metadata"},"license":null,"license_id":null,"version":null}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2309.01452","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4315704968","https://openalex.org/W4285478380","https://openalex.org/W4254960163","https://openalex.org/W3110264473","https://openalex.org/W2370831213","https://openalex.org/W2140061545","https://openalex.org/W2107506952","https://openalex.org/W2100255360","https://openalex.org/W2032810564","https://openalex.org/W1964661231"],"abstract_inverted_index":{"A":[0],"major":[1],"approach":[2],"for":[3,160,181],"defending":[4],"against":[5,102,129],"adversarial":[6,50,91,103,130,178],"attacks":[7],"aims":[8],"at":[9],"controlling":[10],"only":[11],"image":[12,114],"classifiers":[13],"to":[14,49,79,89,125],"be":[15,126],"more":[16,77,127],"resilient,":[17],"and":[18,29,44,58,136,153],"it":[19],"does":[20],"not":[21],"care":[22],"about":[23],"visual":[24,36],"objects,":[25],"such":[26],"as":[27],"pandas":[28],"cars,":[30],"in":[31],"images.":[32],"This":[33,82],"means":[34],"that":[35],"objects":[37],"themselves":[38],"cannot":[39],"take":[40],"any":[41],"defensive":[42,78,98,110,128],"actions,":[43],"they":[45],"are":[46,55,99],"still":[47],"vulnerable":[48],"attacks.":[51,81],"In":[52,69],"contrast,":[53],"letters":[54,76,101,144],"artificial":[56],"symbols,":[57],"we":[59,72,107,120,139],"can":[60,73],"freely":[61],"control":[62,121],"their":[63,67],"appearance":[64],"unless":[65],"losing":[66],"readability.":[68],"other":[70],"words,":[71],"make":[74],"the":[75,80,90,100,122,134,141,162,190],"paper":[83],"poses":[84],"three":[85],"research":[86,192],"questions":[87],"related":[88],"vulnerability":[92],"of":[93,143,164],"letter":[94,113,123,166],"images:":[95],"(1)":[96],"How":[97],"attacks?":[104,117,131],"(2)":[105],"Can":[106,119],"estimate":[108],"how":[109],"a":[111,156,171,176],"given":[112],"is":[115],"before":[116],"(3)":[118],"images":[124,184],"For":[132],"answering":[133],"first":[135],"second":[137],"questions,":[138],"measure":[140],"defensibility":[142,163],"by":[145],"employing":[146],"Iterative":[147],"Fast":[148],"Gradient":[149],"Sign":[150],"Method":[151],"(I-FGSM)":[152],"then":[154],"build":[155],"deep":[157],"regression":[158],"model":[159],"estimating":[161],"each":[165],"image.":[167],"We":[168],"also":[169],"propose":[170],"two-step":[172],"method":[173],"based":[174],"on":[175],"generative":[177],"network":[179],"(GAN)":[180],"generating":[182],"character":[183],"with":[185],"higher":[186],"defensibility,":[187],"which":[188],"solves":[189],"third":[191],"question.":[193]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4386556612","counts_by_year":[],"updated_date":"2025-04-14T06:41:05.838080","created_date":"2023-09-09"}