{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:59:10Z","timestamp":1772909950629,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T00:00:00Z","timestamp":1749254400000},"content-version":"vor","delay-in-days":6,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100006382","name":"Universidad de Oviedo","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100006382","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Machine learning (ML) and deep learning methods have demonstrated exceptional performance in diverse domains, including computer vision, speech and face recognition, autonomous vehicles, the Internet of Things, and cybersecurity. Despite these advances, the vulnerability of ML systems to adversarial attacks, which introduce perturbations to fool classifiers and detectors, poses significant security challenges. As the artificial intelligence (AI) industry increasingly adopts edge computing, the security of AI models becomes critical. Edge devices, constrained by limited computational resources, must run smaller models to achieve comparable latency to cloud-based models on more powerful servers. This work evaluates the impact of adversarial attacks-malicious perturbations designed to degrade the accuracy and reliability of ML models-on recent YOLO detectors from the widely used Ultralytics framework. Specifically, we focus on adversarial patches-carefully crafted patterns overlaid on an image to mislead object detectors into ignoring or misclassifying objects. We create effective naturalistic adversarial patches for recent versions of the Ultralytics YOLO models (YOLOv5, YOLOv8, YOLOv9, and YOLOv10) by upgrading an existing state-of-the-art patch generation approach designed for an earlier YOLOv4 model. We evaluate the attacks on the INRIA and on the MPII datasets across multiple YOLO models. The experimental results demonstrate high effectiveness in object detection evasion in recent models. The results suggest that larger models are more robust to adversarial attacks than their smaller counterparts. We run inference experiments on edge AI devices to highlight the response time improvement achieved by using smaller models, albeit at a higher risk of attack.<\/jats:p>","DOI":"10.1007\/s10207-025-01067-3","type":"journal-article","created":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T16:41:35Z","timestamp":1749314495000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Evaluating the Impact of Adversarial Patch Attacks on YOLO Models and the Implications for Edge AI Security"],"prefix":"10.1007","volume":"24","author":[{"given":"D. L.","family":"Gala","sequence":"first","affiliation":[]},{"given":"J.","family":"Molleda","sequence":"additional","affiliation":[]},{"given":"R.","family":"Usamentiaga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,7]]},"reference":[{"key":"1067_CR1","first-page":"387","volume-title":"Databases","author":"B Biggio","year":"2013","unstructured":"Biggio, B., Corona, I., Maiorca, D., Nelson, B., \u0160rndi\u0107, N., Laskov, P., Giacinto, G., Roli, F.: in Machine Learning and Knowledge Discovery. In: Blockeel, H., Kersting, K., Nijssen, S., \u017delezn\u00fd, F. (eds.) Databases, pp. 387\u2013402. Springer, Berlin Heidelberg, Berlin, Heidelberg (2013)"},{"key":"1067_CR2","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.cose.2017.11.007","volume":"73","author":"S Chen","year":"2018","unstructured":"Chen, S., Xue, M., Fan, L., Hao, S., Xu, L., Zhu, H., Li, B.: Computers & Security 73, 326 (2018). https:\/\/doi.org\/10.1016\/j.cose.2017.11.007","journal-title":"Computers & Security"},{"key":"1067_CR3","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/TIFS.2022.3140687","volume":"17","author":"M Khosravy","year":"2022","unstructured":"Khosravy, M., Nakamura, K., Hirose, Y., Nitta, N., Babaguchi, N.: IEEE Transactions on Information Forensics and Security 17, 357 (2022). https:\/\/doi.org\/10.1109\/TIFS.2022.3140687","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1067_CR4","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.2197\/ipsjjip.28.1010","volume":"28","author":"T Takemura","year":"2020","unstructured":"Takemura, T., Yanai, N., Fujiwara, T.: Journal of Information Processing 28, 1010\u20131024 (2020). https:\/\/doi.org\/10.2197\/ipsjjip.28.1010","journal-title":"Journal of Information Processing"},{"key":"1067_CR5","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: in 3rd International Conference on Learning Representations, ICLR 2015 - Conference Track Proceedings (2015)"},{"key":"1067_CR6","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: (2018)"},{"key":"1067_CR7","doi-asserted-by":"publisher","unstructured":"Carlini, N., Wagner, D.: in Proceedings - IEEE Symposium on Security and Privacy (2017), p. 39 - 57. https:\/\/doi.org\/10.1109\/SP.2017.49","DOI":"10.1109\/SP.2017.49"},{"key":"1067_CR8","unstructured":"Karmon, D., Zoran, D., Goldberg, Y.: in 35th International Conference on Machine Learning, ICML 2018, vol.\u00a06 (2018), vol.\u00a06, p. 3903 - 3911"},{"issue":"5","key":"1067_CR9","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","volume":"23","author":"J Su","year":"2019","unstructured":"Su, J., Vargas, D.V., Sakurai, K.: IEEE Transactions on Evolutionary Computation 23(5), 828 (2019). https:\/\/doi.org\/10.1109\/TEVC.2019.2890858","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"8","key":"1067_CR10","doi-asserted-by":"publisher","first-page":"6125","DOI":"10.1007\/s10462-022-10141-4","volume":"55","author":"W Su","year":"2022","unstructured":"Su, W., Li, L., Liu, F., He, M., Liang, X.: Artificial Intelligence Review 55(8), 6125\u20136183 (2022). https:\/\/doi.org\/10.1007\/s10462-022-10141-4","journal-title":"Artificial Intelligence Review"},{"key":"1067_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04359-w","author":"J Entrialgo","year":"2024","unstructured":"Entrialgo, J., Moreno-Vozmediano, R., D\u00edaz, J.L.: Cluster Computing (2024). https:\/\/doi.org\/10.1007\/s10586-024-04359-w","journal-title":"Cluster Computing"},{"key":"1067_CR12","doi-asserted-by":"publisher","unstructured":"Zhang, H., Ma, X.: Computers and Security 122 (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102876","DOI":"10.1016\/j.cose.2022.102876"},{"key":"1067_CR13","doi-asserted-by":"publisher","first-page":"13203","DOI":"10.1007\/s13369-024-09293-y","volume":"49","author":"L Dhamija","year":"2024","unstructured":"Dhamija, L., Bansal, U.: Arabian Journal for Science and Engineering 49, 13203 (2024). https:\/\/doi.org\/10.1007\/s13369-024-09293-y","journal-title":"Arabian Journal for Science and Engineering"},{"key":"1067_CR14","doi-asserted-by":"publisher","unstructured":"Qin, Y., Zhang, K., Pan, H.: Computers and Security 134 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103460","DOI":"10.1016\/j.cose.2023.103460"},{"key":"1067_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00775","author":"YCT Hu","year":"2021","unstructured":"Hu, Y.C.T., Kung, B.H., Tan, D.S., Chen, J.C., Hua, K.L., Cheng, W.H.: IEEE\/CVF International Conference on Computer Vision (ICCV) (2021). https:\/\/doi.org\/10.1109\/ICCV48922.2021.00775","journal-title":"IEEE\/CVF International Conference on Computer Vision (ICCV)"},{"key":"1067_CR16","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","volume":"84","author":"B Biggio","year":"2018","unstructured":"Biggio, B., Roli, F.: Pattern Recognition 84, 317 (2018). https:\/\/doi.org\/10.1016\/j.patcog.2018.07.023","journal-title":"Pattern Recognition"},{"key":"1067_CR17","doi-asserted-by":"publisher","unstructured":"Wang, X., Li, J., Kuang, X., an\u00a0Tan, Y., Li, J.: Journal of Parallel and Distributed Computing 130, 12 (2019). https:\/\/doi.org\/10.1016\/j.jpdc.2019.03.003","DOI":"10.1016\/j.jpdc.2019.03.003"},{"key":"1067_CR18","doi-asserted-by":"publisher","unstructured":"Martins, N., Cruz, J.M., Cruz, T., Henriques\u00a0Abreu, P.: IEEE Access 8, 35403 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2974752","DOI":"10.1109\/ACCESS.2020.2974752"},{"issue":"2","key":"1067_CR19","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1109\/COMST.2020.2975048","volume":"22","author":"A Qayyum","year":"2020","unstructured":"Qayyum, A., Usama, M., Qadir, J., Al-Fuqaha, A.: IEEE Communications Surveys & Tutorials 22(2), 998 (2020). https:\/\/doi.org\/10.1109\/COMST.2020.2975048","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"1","key":"1067_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3485133","volume":"55","author":"GR Machado","year":"2021","unstructured":"Machado, G.R., Silva, E., Goldschmidt, R.R.: ACM Computing Surveys (CSUR) 55(1), 1 (2021). https:\/\/doi.org\/10.1145\/3485133","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"1067_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100573","volume":"49","author":"P Bountakas","year":"2023","unstructured":"Bountakas, P., Zarras, A., Lekidis, A., Xenakis, C.: Computer Science Review 49, 100573 (2023). https:\/\/doi.org\/10.1016\/j.cosrev.2023.100573","journal-title":"Computer Science Review"},{"key":"1067_CR22","doi-asserted-by":"publisher","unstructured":"Yang, D.Y., Xiong, J., Li, X., Yan, X., Raiti, J., Wang, Y., Wu, H., Zhong, Z., in,: 9th IEEE Annual Ubiquitous Computing. Electronics & Mobile Communication Conference (UEMCON) 2018, 368\u2013374 (2018). https:\/\/doi.org\/10.1109\/UEMCON.2018.8796670","DOI":"10.1109\/UEMCON.2018.8796670"},{"key":"1067_CR23","doi-asserted-by":"publisher","unstructured":"Choi, J.I., Tian, Q.: in 2022 IEEE Intelligent Vehicles Symposium (IV) (2022), pp. 1011\u20131017. https:\/\/doi.org\/10.1109\/IV51971.2022.9827222","DOI":"10.1109\/IV51971.2022.9827222"},{"key":"1067_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103460","volume":"134","author":"Y Qin","year":"2023","unstructured":"Qin, Y., Zhang, K., Pan, H.: Computers & Security 134, 103460 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103460","journal-title":"Computers & Security"},{"key":"1067_CR25","doi-asserted-by":"publisher","unstructured":"Lin, C.Y., Huang, T.Y., Ng, H.F., Lin, W.Y., Farady, I.: IEEE Access 12, 32772 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3371507","DOI":"10.1109\/ACCESS.2024.3371507"},{"key":"1067_CR26","doi-asserted-by":"publisher","unstructured":"Ding, Z., Sun, L., Mao, X., Dai, L., Xu, B.: Signal. Image and Video Processing 18(3), 2485\u20132497 (2024). https:\/\/doi.org\/10.1007\/s11760-023-02924-1. Cited by: 0","DOI":"10.1007\/s11760-023-02924-1"},{"key":"1067_CR27","doi-asserted-by":"publisher","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: in 2009 IEEE conference on computer vision and pattern recognition (Ieee, 2009), pp. 248\u2013255. https:\/\/doi.org\/10.1109\/CVPR.2009.5206848","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"1067_CR28","doi-asserted-by":"publisher","unstructured":"Dalal, N., Triggs, B.: in 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR\u201905), vol.\u00a01 (2005), vol.\u00a01, pp. 886\u2013893 vol. 1. https:\/\/doi.org\/10.1109\/CVPR.2005.177","DOI":"10.1109\/CVPR.2005.177"},{"key":"1067_CR29","unstructured":"Andriluka, M., Pishchulin, L., Gehler, P., Schiele, B.: in IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2014)"},{"issue":"2","key":"1067_CR30","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11263-009-0275-4","volume":"88","author":"M Everingham","year":"2010","unstructured":"Everingham, M., Van Gool, L., Williams, C.K.I., Winn, J., Zisserman, A.: International Journal of Computer Vision 88(2), 303\u2013338 (2010). https:\/\/doi.org\/10.1007\/s11263-009-0275-4","journal-title":"International Journal of Computer Vision"},{"key":"1067_CR31","doi-asserted-by":"publisher","unstructured":"Thys, S., Ranst, W., Goedeme, T.: in 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (IEEE Computer Society, Los Alamitos, CA, USA, 2019), pp. 49\u201355. https:\/\/doi.org\/10.1109\/CVPRW.2019.00012","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"1067_CR32","unstructured":"Wang, A., Chen, H., Liu, L., Chen, K., Lin, Z., Han, J.: G.\u00a0Ding. Yolov10: Real-time end-to-end object detection (2024). https:\/\/arxiv.org\/abs\/2405.14458"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01067-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01067-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01067-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:10:48Z","timestamp":1750500648000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01067-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1067"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01067-3","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6]]},"assertion":[{"value":"22 May 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could appear to have influenced the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration of competing interest"}},{"value":"The source code developed in this work is freely available via public GitHub repositories for further research and evaluation (see Section\u00a0).","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}},{"value":"D.L. Gala: Data curation, Formal analysis, Investigation, Software, Validation, Visualization, Writing - original draft, Writing - review & editing. J. Molleda: Conceptualization, Methodology, Project administration, Resources, Supervision, Writing - original draft, Writing - review & editing. R. Usamentiaga: Funding acquisition, Resources, Writing - review & editing.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"CRediT authorship contribution statement"}}],"article-number":"154"}}