{"id":"https://openalex.org/W4399487388","doi":"https://doi.org/10.1109/tifs.2024.3411921","title":"Boosting the Transferability of Adversarial Attacks With Frequency-Aware Perturbation","display_name":"Boosting the Transferability of Adversarial Attacks With Frequency-Aware Perturbation","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4399487388","doi":"https://doi.org/10.1109/tifs.2024.3411921"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3411921","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3411921","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100455413","display_name":"Yajie Wang","orcid":"https://orcid.org/0000-0002-0962-4464"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yajie Wang","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-0962-4464","affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yi Wu","orcid":"https://orcid.org/0009-0001-1586-3226"},"institutions":[{"id":"https://openalex.org/I4210130112","display_name":"China Academy of Information and Communications Technology","ror":"https://ror.org/038dte259","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210130112","https://openalex.org/I890469752"]},{"id":"https://openalex.org/I890469752","display_name":"Ministry of Industry and Information Technology","ror":"https://ror.org/0385nmy68","country_code":"CN","type":"government","lineage":["https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Wu","raw_affiliation_strings":["Academy of Information and Communications Technology, Beijing, China","China Academy of Information and Communications Technology and the Key Laboratory of Mobile Application Innovation and Governance Technology, Ministry of Industry and Information Technology, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0001-1586-3226","affiliations":[{"raw_affiliation_string":"Academy of Information and Communications Technology, Beijing, China","institution_ids":["https://openalex.org/I4210130112"]},{"raw_affiliation_string":"China Academy of Information and Communications Technology and the Key Laboratory of Mobile Application Innovation and Governance Technology, Ministry of Industry and Information Technology, Beijing, China","institution_ids":["https://openalex.org/I4210130112","https://openalex.org/I890469752"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090304311","display_name":"Shangbo Wu","orcid":"https://orcid.org/0000-0002-0737-7420"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shangbo Wu","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058120371","display_name":"Ximeng Liu","orcid":"https://orcid.org/0000-0002-4238-3295"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ximeng Liu","raw_affiliation_strings":["College of Computer and Data Science, Fuzhou University, Fuzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-4238-3295","affiliations":[{"raw_affiliation_string":"College of Computer and Data Science, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051406984","display_name":"Wanlei Zhou","orcid":"https://orcid.org/0000-0002-1680-2521"},"institutions":[{"id":"https://openalex.org/I6469544","display_name":"City University of Macau","ror":"https://ror.org/04gpd4q15","country_code":"MO","type":"education","lineage":["https://openalex.org/I6469544"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Wanlei Zhou","raw_affiliation_strings":["Faculty of Data Science, City University of Macau, Macau, China"],"raw_orcid":"https://orcid.org/0000-0002-1680-2521","affiliations":[{"raw_affiliation_string":"Faculty of Data Science, City University of Macau, Macau, China","institution_ids":["https://openalex.org/I6469544"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100634361","display_name":"Liehuang Zhu","orcid":"https://orcid.org/0000-0003-3277-3887"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liehuang Zhu","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-3277-3887","affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100380072","display_name":"Chuan Zhang","orcid":"https://orcid.org/0000-0001-7684-8540"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuan Zhang","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-7684-8540","affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100455413"],"corresponding_institution_ids":["https://openalex.org/I125839683"],"apc_list":null,"apc_paid":null,"fwci":3.9513,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.94235632,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"19","issue":null,"first_page":"6293","last_page":"6304"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9063000082969666,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.850330114364624},{"id":"https://openalex.org/keywords/transferability","display_name":"Transferability","score":0.8430455923080444},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7730392217636108},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.7046948671340942},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45066511631011963},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3724590539932251},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34094494581222534}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.850330114364624},{"id":"https://openalex.org/C61272859","wikidata":"https://www.wikidata.org/wiki/Q7834031","display_name":"Transferability","level":3,"score":0.8430455923080444},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7730392217636108},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.7046948671340942},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45066511631011963},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3724590539932251},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34094494581222534},{"id":"https://openalex.org/C140331021","wikidata":"https://www.wikidata.org/wiki/Q1868104","display_name":"Logit","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3411921","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3411921","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","display_name":"Climate action","score":0.6499999761581421}],"awards":[{"id":"https://openalex.org/G4205956192","display_name":null,"funder_award_id":"2023YFF0905300","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4407196569","display_name":null,"funder_award_id":"62202051","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7326534293","display_name":null,"funder_award_id":"2023YFF0612900","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7755912295","display_name":null,"funder_award_id":"2023QNRC001","funder_id":"https://openalex.org/F4320311778","funder_display_name":"China Association for Science and Technology"}],"funders":[{"id":"https://openalex.org/F4320311778","display_name":"China Association for Science and Technology","ror":"https://ror.org/035vmht26"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327514","display_name":"Beijing Institute of Technology Research Fund Program for Young Scholars","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W2093718346","https://openalex.org/W2133665775","https://openalex.org/W2183341477","https://openalex.org/W2194775991","https://openalex.org/W2616247523","https://openalex.org/W2737134362","https://openalex.org/W2774018344","https://openalex.org/W2774644650","https://openalex.org/W2962785568","https://openalex.org/W2962847335","https://openalex.org/W2962872506","https://openalex.org/W2963446712","https://openalex.org/W2964137095","https://openalex.org/W2965496811","https://openalex.org/W2969542116","https://openalex.org/W3034190247","https://openalex.org/W3034196143","https://openalex.org/W3034771037","https://openalex.org/W3035743198","https://openalex.org/W3138516171","https://openalex.org/W3191965994","https://openalex.org/W3202281277","https://openalex.org/W3215885613","https://openalex.org/W4294310809","https://openalex.org/W4312716239","https://openalex.org/W6637373629","https://openalex.org/W6640425456","https://openalex.org/W6729756640","https://openalex.org/W6731927902","https://openalex.org/W6737947904","https://openalex.org/W6750115476","https://openalex.org/W6755233895","https://openalex.org/W6761100157","https://openalex.org/W6763810570","https://openalex.org/W6768366551","https://openalex.org/W6771809012","https://openalex.org/W6774469542","https://openalex.org/W6795140394"],"related_works":["https://openalex.org/W4288055406","https://openalex.org/W4200630034","https://openalex.org/W3137894200","https://openalex.org/W3092178728","https://openalex.org/W4226402597","https://openalex.org/W3132910851","https://openalex.org/W4377864639","https://openalex.org/W4392340763","https://openalex.org/W4283325551","https://openalex.org/W2997056298"],"abstract_inverted_index":{"Deep":[0],"neural":[1],"networks":[2],"(DNNs)":[3],"are":[4,119],"vulnerable":[5],"to":[6,34,38,40,53,60,72,76,91,94,106,122,139,164],"adversarial":[7,81,110,141,199],"examples,":[8],"with":[9,174],"transfer":[10,99],"attacks":[11],"in":[12,29,112],"black-box":[13],"scenarios":[14],"posing":[15],"a":[16,103,113,137,189],"severe":[17],"real-world":[18],"threat.":[19],"Adversarial":[20],"perturbation":[21,183,191,204],"is":[22],"often":[23],"globally":[24],"manipulated":[25],"image":[26],"disturbances":[27],"crafted":[28],"the":[30,41,45,96,128,165],"spatial":[31],"domain,":[32],"leading":[33],"perceptible":[35],"noise":[36],"due":[37],"overfitting":[39,163],"source":[42,166],"model.":[43,167],"Both":[44],"human":[46],"visual":[47],"system":[48],"(HVS)":[49],"and":[50,108,135,211],"DNNs":[51],"(endeavoring":[52],"mimic":[54],"HVS":[55],"behavior)":[56],"exhibit":[57],"unequal":[58],"sensitivity":[59],"different":[61],"frequency":[62,116,133,146,159,186],"components":[63,84,117,187],"of":[64,98,115,130],"an":[65],"image.":[66],"In":[67],"this":[68,74],"paper,":[69],"we":[70,126],"intend":[71],"exploit":[73],"characteristic":[75],"create":[77],"frequency-aware":[78,150,203],"perturbation.":[79],"Concentrating":[80],"perturbations":[82,155],"on":[83,143],"within":[85,156,184],"images":[86],"that":[87,118,180],"contribute":[88],"more":[89,120],"significantly":[90,161],"model":[92,123],"inference":[93],"enhance":[95],"performance":[97],"attacks.":[100,177],"We":[101],"devise":[102,136],"systematic":[104],"approach":[105,153,169,195],"select":[107],"constrain":[109],"optimization":[111,142],"subset":[114],"critical":[121,158],"prediction.":[124],"Specifically,":[125],"measure":[127],"contributions":[129],"each":[131],"individual":[132],"component":[134],"scheme":[138],"concentrate":[140],"these":[144],"important":[145],"components,":[147,160],"thereby":[148],"creating":[149],"perturbations.":[151],"Our":[152,168],"confines":[154],"model-agnostic":[157],"reducing":[162],"can":[170],"be":[171],"seamlessly":[172],"integrated":[173],"existing":[175],"state-of-the-art":[176],"Experiments":[178],"demonstrate":[179],"while":[181],"concentrating":[182],"selected":[185],"yields":[188],"smaller":[190],"magnitude":[192],"overall,":[193],"our":[194,202],"does":[196],"not":[197],"sacrifice":[198],"effectiveness.":[200],"Conversely,":[201],"manifests":[205],"superior":[206],"performance,":[207],"boosting":[208],"imperceptibility,":[209],"transferability,":[210],"evasion":[212],"against":[213],"various":[214],"defenses.":[215]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2025-10-10T00:00:00"}
