Citation: | ZHENG Jiamin, ZHANG Yaoyuan, LI Yuanzhang, WU Shangbo, YU Xiao. Towards Evaluating the Robustness of Adversarial Attacks Against Image Scaling Transformation[J]. Chinese Journal of Electronics, 2023, 32(1): 151-158. doi: 10.23919/cje.2021.00.309 |
[1] |
W. Li, W. Meng, Z. Tan, and Y. Xiang, “Design of multi-view based email classification for IOT systems via semi-supervised learning,” Journal of Network and Computer Applications, vol.128, pp.56–63, 2019. doi: 10.1016/j.jnca.2018.12.002
|
[2] |
F. Ullah, H. Naeem, S. Jabbar, S. Khalid, M. A. Latif, et al., “Cyber security threats detection in Internet of things using deep learning approach,” IEEE Access, vol.7, pp.124379–124389, 2019. doi: 10.1109/ACCESS.2019.2937347
|
[3] |
F. Al-Turjman, H. Zahmatkesh, and L. Mostarda, “Quantifying uncertainty in internet of medical things and big-data services using intelligence and deep learning,” IEEE Access, vol.7, pp.115749–115759, 2019. doi: 10.1109/ACCESS.2019.2931637
|
[4] |
Z. Lv, W. Mazurczyk, S. Wendzel, and H. Song, “Guest editorial: Recent advances in cyber-physical security in industrial environments,” IEEE Transactions on Industrial Informatics, vol.15, no.12, pp.6468–6471, 2019. doi: 10.1109/TII.2019.2945971
|
[5] |
M. Daraghmeh, I. Al Ridhawi, M. Aloqaily, Y. Jararweh, and A. Agarwal. “A power management approach to reduce energy consumption for edge computing servers,” in Proceedings of 2019 Forth International Conference on Fog and Mobile Edge Computing, Rome, Italy, pp.259–264, 2019.
|
[6] |
Shuming Qiu, Ding Wang, Guoai Xu, and Saru Kumari, “Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices,” IEEE Transactions on Dependable and Secure Computing, vol.19, no.2, pp.1338–1351, 2020. doi: 10.1109/TDSC.2020.3022797
|
[7] |
C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, et al., “Intriguing properties of neural networks,” arXiv preprint, arXiv:1312.6199, 2013.
|
[8] |
Z. Gu, Y. Xie, W. Hu, L. Yin, Y. Han, and Z. Tian, “Marginal attacks of generating adversarial examples for spam filtering,” Chinese Journal of Electronics, vol.30, no.4, pp.595–602, 2021. doi: 10.1049/cje.2021.05.001
|
[9] |
C. Wang, D. Wang, Y. Tu, et al., “Understanding node capture attacks in user authentication schemes for wireless sensor networks,” IEEE Transactions on Dependable and Secure Computing, vol.19, no.1, pp.507–523, 2022. doi: 10.1109/TDSC.2020.2974220
|
[10] |
H. Lyu, Y. Tan, Y. Xue, Y. Wang, and J. Xue, “A CMA-ES-based adversarial attack against black-box object detectors,” Chinese Journal of Electronics, vol.30, no.3, pp.406–412, 2021. doi: 10.1049/cje.2021.03.003
|
[11] |
H. Zhang, Y. Yu, J. Jiao, E. Xing, et al., “Theoretically principled trade-off between robustness and accuracy,” in Proceedings of the 36th International Conference on Machine Learning, California, USA, pp.7472–7482, 2019.
|
[12] |
C. Xie, Z. Zhang, Y. Zhou, S. Bai, J. Wang, Z. Ren, and A. L. Yuille, “Improving transferability of adversarial examples with input diversity,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Long Beach, CA, USA, pp.2725–2734, 2019.
|
[13] |
D. Wang, X. Zhang, Z. Zhang, and P. Wang, “Understanding security failures of multi-factor authentication schemes for multi-server environments,” Computers & Security, vol.88, article no.101619, 2020. doi: 10.1016/j.cose.2019.101619
|
[14] |
T. Yu, S. Wang, C. Zhang, Z. Wang, Y. Li, and X.Yu, “Targeted adversarial examples generating method based on cVAE in black box settings,” Chinese Journal of Electronics, vol.30, no.5, pp.866–875, 2021. doi: 10.1049/cje.2021.06.009
|
[15] |
Y. Dong, Q. Fu, X. Yang, T. Pang, et al., “Benchmarking adversarial robustness on image classification,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA, pp.318–328, 2020.
|
[16] |
C. Wang, D. Wang, G. Xu, and D. He, “Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0,” Science China Information Sciences, vol.65, no.1, article no.112301, 2022. doi: 10.1007/s11432-020-2975-6
|
[17] |
J. Chen, M. I. Jordan, and M. J. Wainwright, “HopSkipJumpAttack: A query-efficient decision-based attack,” in Proceedings of 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, pp.1277–1294, 2020.
|
[18] |
J. Deng, W. Dong, R. Socher, L. Li, K. Li and F. Li, “Imagenet: A large-scale hierarchical image database,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Miami, FL, USA, pp.248–255, 2009.
|
[19] |
K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, pp.770–778, 2016.
|