{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T04:02:24Z","timestamp":1747368144051,"version":"3.40.5"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031928857","type":"print"},{"value":"9783031928864","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92886-4_10","type":"book-chapter","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T06:12:49Z","timestamp":1747289569000},"page":"140-154","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["How Stealthy is Stealthy? Studying the\u00a0Efficacy of\u00a0Black-Box Adversarial Attacks in\u00a0the\u00a0Real World"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-1510-2594","authenticated-orcid":false,"given":"Francesco","family":"Panebianco","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9467-1523","authenticated-orcid":false,"given":"Mario","family":"D\u2019Onghia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4710-5283","authenticated-orcid":false,"given":"Stefano","family":"Zanero","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8284-6074","authenticated-orcid":false,"given":"Michele","family":"Carminati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,16]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","unstructured":"Aldahdooh, A., Hamidouche, W., Fezza, S.A., D\u00e9forges, O.: Adversarial example detection for DNN models: a review and experimental comparison. Artif. Intell. Rev. 1\u201360 (2022). https:\/\/doi.org\/10.1007\/s10462-021-10125-w","DOI":"10.1007\/s10462-021-10125-w"},{"key":"10_CR2","unstructured":"Al-Dujaili, A., O\u2019Reilly, U.M.: Sign bits are all you need for black-box attacks. In: International Conference on Learning Representations (2020). https:\/\/openreview.net\/forum?id=SygW0TEFwH"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Andriushchenko, M., Croce, F., Flammarion, N., Hein, M.: Square attack: a query-efficient black-box adversarial attack via random search. In: European Conference on Computer Vision (2020)","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"10_CR4","unstructured":"Brendel, W., Rauber, J., Bethge, M.: Decision-based adversarial attacks: reliable attacks against black-box machine learning models. In: International Conference on Learning Representations (2018)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Byun, J., Go, H., Kim, C.: On the effectiveness of small input noise for defending against query-based black-box attacks. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV), pp. 3051\u20133060 (2022)","DOI":"10.1109\/WACV51458.2022.00387"},{"key":"10_CR6","doi-asserted-by":"publisher","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 39\u201357. IEEE Computer Society, Los Alamitos, CA, USA (2017). https:\/\/doi.org\/10.1109\/SP.2017.49","DOI":"10.1109\/SP.2017.49"},{"key":"10_CR7","doi-asserted-by":"publisher","unstructured":"Chen, P.Y., Zhang, H., Sharma, Y., Yi, J., Hsieh, C.J.: Zoo: zeroth order optimization based black-box attacks to deep neural networks without training substitute models. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, AISec 2017, pp. 15\u201326. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3128572.3140448","DOI":"10.1145\/3128572.3140448"},{"key":"10_CR8","unstructured":"Corrado, A.: Animals-10. https:\/\/www.kaggle.com\/datasets\/alessiocorrado99\/animals10"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Croce, F., Andriushchenko, M., Singh, N.D., Flammarion, N., Hein, M.: Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a036, no. 6, pp. 6437\u20136445 (2022)","DOI":"10.1609\/aaai.v36i6.20595"},{"key":"10_CR10","doi-asserted-by":"publisher","unstructured":"Dang, H., Huang, Y., Chang, E.C.: Evading classifiers by morphing in the dark. In: Conference on Computer and Communications Security (2017). https:\/\/doi.org\/10.1145\/3133956.3133978","DOI":"10.1145\/3133956.3133978"},{"key":"10_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.108985","volume":"133","author":"L Giulivi","year":"2023","unstructured":"Giulivi, L., et al.: Adversarial scratches: deployable attacks to CNN classifiers. Pattern Recogn. 133, 108985 (2023)","journal-title":"Pattern Recogn."},{"key":"10_CR12","unstructured":"Goodfellow, I., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: International Conference of Learning Representations (2015). aRXIV_ID: 1412.6572"},{"key":"10_CR13","unstructured":"Guo, C., Gardner, J.R., You, Y., Wilson, A.G., Weinberger, K.Q.: Simple black-box adversarial attacks. In: International Conference on Machine Learning, pp. 2484\u20132493 (2019)"},{"key":"10_CR14","unstructured":"Inkawhich, N., et al.: Perturbing across the feature hierarchy to improve standard and strict blackbox attack transferability. arXiv, Cryptography and Security (2020)"},{"key":"10_CR15","doi-asserted-by":"publisher","unstructured":"Chen, J., et al.: HopSkipJumpAttack: a query-efficient decision-based attack. In: IEEE Symposium on Security and Privacy, pp. 1277\u20131294 (2020). https:\/\/doi.org\/10.1109\/sp40000.2020.00045","DOI":"10.1109\/sp40000.2020.00045"},{"key":"10_CR16","doi-asserted-by":"publisher","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S.: Adversarial examples in the physical world. arXiv, Computer Vision and Pattern Recognition (2016). https:\/\/doi.org\/10.1201\/9781351251389-8","DOI":"10.1201\/9781351251389-8"},{"key":"10_CR17","unstructured":"Liu, Y., Chen, X., Liu, C., Song, D.: Delving into transferable adversarial examples and black-box attacks. In: International Conference on Learning Representations (2016)"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Liu, Z., Li, F., Lin, J., Li, Z., Luo, B.: Hide and seek: on the stealthiness of attacks against deep learning systems. In: European Symposium on Research in Computer Security, pp. 343\u2013363. Springer, Cham (2022)","DOI":"10.1007\/978-3-031-17143-7_17"},{"key":"10_CR19","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I.: Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. _eprint: 1605.07277"},{"key":"10_CR20","doi-asserted-by":"publisher","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z.B., Swami, A.: Practical black-box attacks against machine learning. In: ACM Asia Conference on Computer and Communications Security, pp. 506\u2013519 (2017). https:\/\/doi.org\/10.1145\/3052973.3053009","DOI":"10.1145\/3052973.3053009"},{"key":"10_CR21","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., Fergus, R.: Intriguing properties of neural networks. In: International Conference on Learning Representations (2014)"},{"key":"10_CR22","doi-asserted-by":"publisher","unstructured":"Maho, T., Furon, T., Le\u00a0Merrer, E.: SurFree: a fast surrogate-free black-box attack. arXiv, Cryptography and Security (2020). https:\/\/doi.org\/10.1109\/cvpr46437.2021.01029","DOI":"10.1109\/cvpr46437.2021.01029"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92886-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T06:12:57Z","timestamp":1747289577000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92886-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031928857","9783031928864"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92886-4_10","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"16 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that\u00a0are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"The survey on visual stealthiness did not collect any personal or identifiable information, including age, ensuring complete anonymity. Participation was voluntary and no incentive was given to participate. Even though no age-specific data was collected, we infer the survey demographic to be mostly under 30, given the channels where the survey was spread (student mailing list and social media).","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Statement"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2025.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}