{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T13:20:48Z","timestamp":1753881648582,"version":"3.41.2"},"reference-count":31,"publisher":"World Scientific Pub Co Pte Ltd","issue":"02","funder":[{"name":"science and technology planning project of liaoning","award":["20-203-5-32"],"award-info":[{"award-number":["20-203-5-32"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J CIRCUIT SYST COMP"],"published-print":{"date-parts":[[2022,1,30]]},"abstract":"<jats:p> Adversarial attack on neural networks has become an important problem restricting its security applications, and among adversarial attacks oriented towards the sample set, the universal perturbation design causing most sample output errors is critical to the study. This paper takes the neural network for image classification as the research object, summarizes the existing universal perturbation generation algorithm, proposes a universal perturbation generation algorithm combining batch stochastic gradient rise and spherical projection search, achieves loss function reduction through the iterative training of stochastic gradient rise in batch samples, and limits the universal perturbation search to a high-dimensional sphere with radius [Formula: see text] to reduce the search space of universal perturbation. Moreover, the regularized technology is introduced to improve the generation quality of universal perturbations. The experimental results show that compared with the baseline algorithm, the attack success rate increases by more than 10%, the solution efficiency of universal perturbation is improved by one order of magnitude, and the quality controllability of universal perturbation is better. <\/jats:p>","DOI":"10.1142\/s0218126622500384","type":"journal-article","created":{"date-parts":[[2021,9,12]],"date-time":"2021-09-12T05:53:34Z","timestamp":1631426014000},"source":"Crossref","is-referenced-by-count":1,"title":["An Universal Adversarial Attack Method Based on Spherical Projection"],"prefix":"10.1142","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8127-6292","authenticated-orcid":false,"given":"Chunlong","family":"Fan","sequence":"first","affiliation":[{"name":"School of Computer Science And Engineering, Northeastern University, Shenyang, LiaoNing, P. R. China"}]},{"given":"Zhimin","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science And Engineering, Northeastern University, Shenyang, LiaoNing, P. R. China"}]},{"given":"Jianzhong","family":"Qiao","sequence":"additional","affiliation":[{"name":"School of Computer Science And Engineering, Northeastern University, Shenyang, LiaoNing, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2021,9,9]]},"reference":[{"key":"S0218126622500384BIB001","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"S0218126622500384BIB003","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.014220"},{"key":"S0218126622500384BIB005","first-page":"2722","volume-title":"Proc. Int. Conf. Computer Vision","author":"Chen C.","year":"2015"},{"key":"S0218126622500384BIB006","first-page":"2021","volume-title":"Proc. 2017 Conf. Empirical Methods in Natural Language Processing","author":"Jia R.","year":"2017"},{"volume-title":"8th International Conference on Learning Representations","author":"Gleave A.","key":"S0218126622500384BIB008"},{"key":"S0218126622500384BIB009","first-page":"1","volume":"99","author":"Zhao L.","year":"2020","journal-title":"IEEE Netw."},{"volume-title":"3rd International Conference on Learning Representations","author":"Goodfellow I. J.","key":"S0218126622500384BIB010"},{"first-page":"99","volume-title":"5th International Conference on Learning Representations","author":"Kurakin A.","key":"S0218126622500384BIB011"},{"volume-title":"6th International Conference on Learning Representations","author":"Madry A.","key":"S0218126622500384BIB012"},{"key":"S0218126622500384BIB014","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"S0218126622500384BIB015","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"S0218126622500384BIB017","first-page":"372","volume-title":"Proc. IEEE European Symp Security and Privacy, Saarbrucken","author":"Papernot N.","year":"2016"},{"key":"S0218126622500384BIB018","first-page":"86","volume-title":"Proc. 2017 IEEE Conf. Computer Vision and Pattern Recognition","author":"Moosavi-Dezfooli S.-M.","year":"2017"},{"key":"S0218126622500384BIB019","first-page":"2574","volume-title":"Proc. 2016 IEEE Conf. Computer Vision and Pattern Recognition","author":"Moosavi-Dezfooli S.-M.","year":"2016"},{"key":"S0218126622500384BIB020","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/SP.2017.49","volume-title":"Proc. 2017 IEEE Symp. Security and Privacy","author":"Carlini N.","year":"2017"},{"key":"S0218126622500384BIB021","first-page":"6754","volume-title":"Proc. 34th AAAI Conf. Artificial Intelligence","author":"Chaoning Z.","year":"2020"},{"key":"S0218126622500384BIB022","doi-asserted-by":"crossref","first-page":"107309","DOI":"10.1016\/j.patcog.2020.107309","volume":"105","author":"Yucheng S.","year":"2020","journal-title":"Pattern Recognit."},{"key":"S0218126622500384BIB023","first-page":"2730","volume-title":"Proc. 2019 IEEE\/CVF Conf. Computer Vision and Pattern Recognition","author":"Cihang X.","year":"2019"},{"key":"S0218126622500384BIB024","doi-asserted-by":"crossref","first-page":"8562","DOI":"10.1109\/CVPR.2018.00893","volume-title":"Proc. 2018 IEEE\/CVF Conf. Computer Vision and Pattern Recognition","author":"Oseledets I.","year":"2018"},{"volume-title":"British Machine Vision Conference 2017","author":"Mopuri K. R.","key":"S0218126622500384BIB025"},{"key":"S0218126622500384BIB026","first-page":"1277","volume-title":"Proc. 24th Int. Conf. Pattern Recognition","author":"Sivy W.","year":"2018"},{"key":"S0218126622500384BIB028","first-page":"43","volume-title":"Proc. IEEE Security and Privacy Workshops","author":"Hayes J.","year":"2018"},{"key":"S0218126622500384BIB029","doi-asserted-by":"crossref","first-page":"742","DOI":"10.1109\/CVPR.2018.00084","volume-title":"Proc. 2018 IEEE\/CVF Conf. on Computer Vision and Pattern Recognition","author":"Mopuri K. R.","year":"2018"},{"key":"S0218126622500384BIB030","first-page":"19","volume-title":"Proc. European Conf. Computer Vision","author":"Mopuri K. R.","year":"2018"},{"key":"S0218126622500384BIB031","first-page":"431","volume-title":"Proc. 2020 IEEE 10th Int. Conf. Intelligent Systems","author":"Zifei W.","year":"2020"},{"key":"S0218126622500384BIB032","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.patrec.2020.04.025","volume":"135","author":"Din S. U.","year":"2020","journal-title":"Pattern Recogni. Lett."},{"key":"S0218126622500384BIB033","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2861800"},{"key":"S0218126622500384BIB034","first-page":"14521","volume-title":"Proc. 2020 IEEE\/CVF Conf. Computer Vision and Pattern Recognition","author":"Chaoning Z.","year":"2020"},{"key":"S0218126622500384BIB037","series-title":"Conference Track Proceedings","volume-title":"2nd International Conference on Learning Representations","author":"Lin M.","year":"2014"},{"first-page":"1","volume-title":"International Conference on Learning Representations","author":"Simonyan K.","key":"S0218126622500384BIB038"},{"key":"S0218126622500384BIB039","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"}],"container-title":["Journal of Circuits, Systems and Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218126622500384","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T09:33:23Z","timestamp":1645781603000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218126622500384"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,9]]},"references-count":31,"journal-issue":{"issue":"02","published-print":{"date-parts":[[2022,1,30]]}},"alternative-id":["10.1142\/S0218126622500384"],"URL":"https:\/\/doi.org\/10.1142\/s0218126622500384","relation":{},"ISSN":["0218-1266","1793-6454"],"issn-type":[{"type":"print","value":"0218-1266"},{"type":"electronic","value":"1793-6454"}],"subject":[],"published":{"date-parts":[[2021,9,9]]},"article-number":"2250038"}}