{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:51Z","timestamp":1750309611220,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707944","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:30:17Z","timestamp":1747247417000},"page":"1539-1547","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["N-Pixels: a Novel Grey-Box Adversarial Attack for Fooling Convolutional Neural Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5489-5370","authenticated-orcid":false,"given":"Salvatore","family":"Della Torca","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Information Technologies, University of Napoli Federico II, Napoli, Italy"},{"name":"Department of Management, Information and Production Engineering, University of Bergamo, Bergamo, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0964-7014","authenticated-orcid":false,"given":"Valentina","family":"Casola","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Technologies, University of Napoli Federico II, Napoli, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0713-4365","authenticated-orcid":false,"given":"Simone","family":"Izzo","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Technologies, University of Napoli Federico II, Napoli, Italy"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"volume-title":"Ineffectiveness of Digital Transformations for Detecting Adversarial Attacks Against Quantized and Approximate CNNs. In 2024 IEEE International Conference on Cyber Security and Resilience (CSR)","author":"Barone Salvatore","key":"e_1_3_2_1_1_1","unstructured":"Salvatore Barone, Valentina Casola, and Salvatore Della Torca. 2024. Ineffectiveness of Digital Transformations for Detecting Adversarial Attacks Against Quantized and Approximate CNNs. In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 290\u2013295."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3323617"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp). Ieee 39\u201357.","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664476.3670449"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12028"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3574159"},{"key":"e_1_3_2_1_7_1","volume-title":"How deep learning sees the world: A survey on adversarial attacks & defenses","author":"Costa Joana C","year":"2024","unstructured":"Joana C Costa, Tiago Roxo, Hugo Proen\u00e7a, and Pedro RM In\u00e1cio. 2024. How deep learning sees the world: A survey on adversarial attacks & defenses. IEEE Access (2024)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB48548.2020.9304898"},{"key":"e_1_3_2_1_9_1","first-page":"366","article-title":"Asirra: a CAPTCHA that exploits interest-aligned manual image categorization","volume":"7","author":"Elson Jeremy","year":"2007","unstructured":"Jeremy Elson, John R Douceur, Jon Howell, and Jared Saul. 2007. Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. CCS 7 (2007), 366\u2013374.","journal-title":"CCS"},{"key":"e_1_3_2_1_10_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_11_1","volume-title":"International conference on machine learning. PMLR, 2484\u20132493","author":"Guo Chuan","year":"2019","unstructured":"Chuan Guo, Jacob Gardner, Yurong You, Andrew Gordon Wilson, and Kilian Weinberger. 2019. Simple black-box adversarial attacks. In International conference on machine learning. PMLR, 2484\u20132493."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00140"},{"key":"e_1_3_2_1_14_1","unstructured":"Alex Krizhevsky Geoffrey Hinton et al. 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_2_1_15_1","volume-title":"Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems 25","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems 25 (2012)."},{"key":"e_1_3_2_1_16_1","volume-title":"Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236","author":"Kurakin Alexey","year":"2016","unstructured":"Alexey Kurakin, Ian Goodfellow, and Samy Bengio. 2016. Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236 (2016)."},{"volume-title":"Artificial intelligence safety and security","author":"Kurakin Alexey","key":"e_1_3_2_1_17_1","unstructured":"Alexey Kurakin, Ian J Goodfellow, and Samy Bengio. 2018. Adversarial examples in the physical world. In Artificial intelligence safety and security. Chapman and Hall\/CRC, 99\u2013112."},{"key":"e_1_3_2_1_18_1","volume-title":"I See Dead People: Gray-box adversarial attack on image-to-text models. arXiv preprint arXiv:2306.07591","author":"Lapid Raz","year":"2023","unstructured":"Raz Lapid and Moshe Sipper. 2023. I See Dead People: Gray-box adversarial attack on image-to-text models. arXiv preprint arXiv:2306.07591 (2023)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.3003837"},{"key":"e_1_3_2_1_20_1","volume-title":"Visualizing and understanding convolutional networks. Computer Vision-ECCV 2014","author":"Ma MD","year":"2013","unstructured":"MD Ma and R Fergus. 2013. Visualizing and understanding convolutional networks. Computer Vision-ECCV 2014 (2013)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_22_1","first-page":"237","article-title":"the effects of modified ReLU activation functions in image classification","volume":"7","author":"Nworu CC","year":"2022","unstructured":"CC Nworu, JE Ekpenyong, J Chisimkwuo, G Okwara, OJ Agwu, and NC Onyeukwu. 2022. the effects of modified ReLU activation functions in image classification. J Biomed. Eng. Med. Dev. 7 (2022), 237.","journal-title":"J Biomed. Eng. Med. Dev."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"e_1_3_2_1_24_1","volume-title":"The Plant Pathology Challenge 2020 data set to classify foliar disease of apples. Applications in plant sciences 8, 9","author":"Thapa Ranjita","year":"2020","unstructured":"Ranjita Thapa, Kai Zhang, Noah Snavely, Serge Belongie, and Awais Khan. 2020. The Plant Pathology Challenge 2020 data set to classify foliar disease of apples. Applications in plant sciences 8, 9 (2020), e11390."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/FG52635.2021.9667076"},{"key":"e_1_3_2_1_26_1","volume-title":"Generating adversarial examples with adversarial networks. arXiv preprint arXiv:1801.02610","author":"Xiao Chaowei","year":"2018","unstructured":"Chaowei Xiao, Bo Li, Jun-Yan Zhu, Warren He, Mingyan Liu, and Dawn Song. 2018. Generating adversarial examples with adversarial networks. arXiv preprint arXiv:1801.02610 (2018)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISC.2018.8398903"}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Catania International Airport Catania Italy","acronym":"SAC '25"},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707944","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707944","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:36Z","timestamp":1750298256000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707944"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":27,"alternative-id":["10.1145\/3672608.3707944","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707944","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}