{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T13:19:51Z","timestamp":1753881591374,"version":"3.41.2"},"reference-count":32,"publisher":"World Scientific Pub Co Pte Ltd","issue":"03n04","funder":[{"DOI":"10.13039\/100014103","name":"Key Technology Research and Development Program of Shandong Province","doi-asserted-by":"publisher","award":["023RKL01001"],"award-info":[{"award-number":["023RKL01001"]}],"id":[{"id":"10.13039\/100014103","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2022MF299"],"award-info":[{"award-number":["ZR2022MF299"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Patt. Recogn. Artif. Intell."],"published-print":{"date-parts":[[2025,3,30]]},"abstract":"<jats:p> Backdoor attacks have severely threatened deep neural network (DNN) models in the past several years. Compared to adversarial attacks, backdoor attacks are always carried out during the training phase. The attacked model behaves normally on benign samples, it makes wrong predictions for samples containing triggers. This paper proposes a novel backdoor attack that makes imperceptible changes. Concretely, the attack first utilizes the pre-trained victim model to extract low-level and high-level semantic features from clean images and generates trigger patterns associated with high-level features based on channel attention. Then, the encoder model generates poisoned images based on the trigger and extracted low-level semantic features without causing noticeable feature loss. The attack is evaluated on two prominent image classification DNNs across three standard datasets. The results demonstrate that our attack achieves high attack success rates while maintaining robustness against backdoor defenses. Furthermore, extensive image similarity experiments emphasize the stealthiness of this attack strategy. <\/jats:p>","DOI":"10.1142\/s0218001425500041","type":"journal-article","created":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T06:38:27Z","timestamp":1737527907000},"source":"Crossref","is-referenced-by-count":0,"title":["An Invisible Backdoor Attack Based on Semantic Feature"],"prefix":"10.1142","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-9246-0689","authenticated-orcid":false,"given":"Yangming","family":"Chen","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Ocean University of China, Qingdao, Shandong, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7421-5579","authenticated-orcid":false,"given":"Xiaowei","family":"Xu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Ocean University of China, Qingdao, Shandong, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1604-1483","authenticated-orcid":false,"given":"Xiaodong","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Ocean University of China, Qingdao, Shandong, P. R. China"}]},{"given":"Zewen","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Ocean University of China, Qingdao, Shandong, P. R. China"}]},{"given":"Wenmin","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Ocean University of China, Qingdao, Shandong, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2025,3,29]]},"reference":[{"key":"S0218001425500041BIB001","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8802997"},{"key":"S0218001425500041BIB003","first-page":"7546","volume-title":"Advances in Neural Information Processing Systems","volume":"36","author":"Chen Z.","year":"2024"},{"key":"S0218001425500041BIB005","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"issue":"2","key":"S0218001425500041BIB006","first-page":"1148","volume":"35","author":"Cheng S.","year":"2021","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"S0218001425500041BIB007","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"S0218001425500041BIB008","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427264"},{"key":"S0218001425500041BIB009","first-page":"18944","volume":"34","author":"Doan K.","year":"2021","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"3","key":"S0218001425500041BIB011","first-page":"1851","volume":"38","author":"Gao Y.","year":"2024","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"S0218001425500041BIB013","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"volume-title":"The Tenth Int. Conf. Learning Representations, ICLR 2022","year":"2022","author":"Guo J.","key":"S0218001425500041BIB014"},{"key":"S0218001425500041BIB015","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"S0218001425500041BIB016","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2913372"},{"key":"S0218001425500041BIB017","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"S0218001425500041BIB018","first-page":"16216","volume-title":"Int. Conf. Machine Learning","author":"Khaddaj A.","year":"2023"},{"issue":"5","key":"S0218001425500041BIB021","first-page":"2088","volume":"18","author":"Li S.","year":"2020","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"S0218001425500041BIB022","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02327"},{"key":"S0218001425500041BIB023","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"S0218001425500041BIB024","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"S0218001425500041BIB025","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58607-2_11"},{"key":"S0218001425500041BIB026","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2017.16"},{"key":"S0218001425500041BIB027","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2023.3330126"},{"key":"S0218001425500041BIB032","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"S0218001425500041BIB033","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"S0218001425500041BIB035","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2011.6033395"},{"key":"S0218001425500041BIB036","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952518"},{"key":"S0218001425500041BIB037","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3319492"},{"key":"S0218001425500041BIB038","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"S0218001425500041BIB039","first-page":"39299","volume-title":"Int. Conf. Machine Learning","author":"Yang Z.","year":"2023"},{"key":"S0218001425500041BIB040","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01179"},{"key":"S0218001425500041BIB041","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3201472"},{"key":"S0218001425500041BIB043","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3375751"},{"key":"S0218001425500041BIB044","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom60117.2023.00133"}],"container-title":["International Journal of Pattern Recognition and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218001425500041","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T03:31:24Z","timestamp":1745379084000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218001425500041"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,29]]},"references-count":32,"journal-issue":{"issue":"03n04","published-print":{"date-parts":[[2025,3,30]]}},"alternative-id":["10.1142\/S0218001425500041"],"URL":"https:\/\/doi.org\/10.1142\/s0218001425500041","relation":{},"ISSN":["0218-0014","1793-6381"],"issn-type":[{"type":"print","value":"0218-0014"},{"type":"electronic","value":"1793-6381"}],"subject":[],"published":{"date-parts":[[2025,3,29]]},"article-number":"2550004"}}