{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:30:48Z","timestamp":1773156648652,"version":"3.50.1"},"reference-count":23,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2022,2,2]],"date-time":"2022-02-02T00:00:00Z","timestamp":1643760000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2022,2,2]]},"abstract":"<jats:p>Deep neural networks (DNNs) are vulnerable to adversarial examples, which are crafted by adding small, human-imperceptible perturbations to the original images, but make the model output inaccurate predictions. Before DNNs are deployed, adversarial attacks can thus be an important method to evaluate and select robust models in safety-critical applications. However, under the challenging black-box setting, the attack success rate, i.e., the transferability of adversarial examples, still needs to be improved. Based on image augmentation methods, this paper found that random transformation of image brightness can eliminate overfitting in the generation of adversarial examples and improve their transferability. In light of this phenomenon, this paper proposes an adversarial example generation method, which can be integrated with Fast Gradient Sign Method (FGSM)-related methods to build a more robust gradient-based attack and to generate adversarial examples with better transferability. Extensive experiments on the ImageNet dataset have demonstrated the effectiveness of the aforementioned method. Whether on normally or adversarially trained networks, our method has a higher success rate for black-box attacks than other attack methods based on data augmentation. It is hoped that this method can help evaluate and improve the robustness of models.<\/jats:p>","DOI":"10.3233\/jifs-211157","type":"journal-article","created":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T06:05:29Z","timestamp":1634709929000},"page":"1693-1704","source":"Crossref","is-referenced-by-count":6,"title":["Random Transformation of image brightness for adversarial attack"],"prefix":"10.1177","volume":"42","author":[{"given":"Bo","family":"Yang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China"},{"name":"Henan Key Laboratory of Information Security, Zhengzhou, Henan, China"}]},{"given":"Kaiyong","family":"Xu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China"},{"name":"Henan Key Laboratory of Information Security, Zhengzhou, Henan, China"}]},{"given":"Hengjun","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China"},{"name":"Henan Key Laboratory of Information Security, Zhengzhou, Henan, China"}]},{"given":"Hengwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, China"},{"name":"Henan Key Laboratory of Information Security, Zhengzhou, Henan, China"}]}],"member":"179","reference":[{"issue":"6","key":"10.3233\/JIFS-211157_ref1","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/3065386","article-title":"ImageNet classification with deep convolutional neural networks,\u201d","volume":"60","author":"Krizhevsky","year":"2017","journal-title":"Commun. ACM"},{"key":"10.3233\/JIFS-211157_ref2","unstructured":"Simonyan K. , Zisserman A. , Very deep convolutional networks for large-scale image recognition. In Yoshua Bengio and Yann LeCun, editors, 3rd International Conference on Learning Representations, ICLR (2015)."},{"key":"10.3233\/JIFS-211157_ref3","doi-asserted-by":"crossref","unstructured":"Szegedy C. , et al., Going deeper with convolutions, in Proc. IEEE Conf. Comput.VisionPattern Recognit. (CVPR), Boston, MA, USA, (2015), 1\u20139.","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"10.3233\/JIFS-211157_ref4","doi-asserted-by":"crossref","unstructured":"He K. , Zhang X. , Ren S. , Sun J. , Deep Residual Learning for Image Recognition, in Proc. IEEE Conf. Comput. Vision Pattern Recognit. (CVPR), Las Vegas, NV, USA, (2016), 770\u2013778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"10.3233\/JIFS-211157_ref5","unstructured":"Szegedy C. , Zaremba W. , Sutskever I. , Bruna J. , Erhan D. , Goodfellow I.J. , Fergus R. , Intriguing properties of neural networks, In Yoshua Bengio and Yann LeCun, editors, 2nd International Conference on Learning Representations, ICLR (2014)."},{"key":"10.3233\/JIFS-211157_ref6","unstructured":"Goodfellow I.J. , Shlens J. , Szegedy C. , Explaining and harnessing adversarial examples, In Y. Bengio and Y. LeCun, editors, 3rd International Conference on Learning Representations, ICLR (2015)."},{"key":"10.3233\/JIFS-211157_ref7","doi-asserted-by":"crossref","unstructured":"Eykholt K. , et al., Robust physical-world attacks on deep learning visual classification, in Proc. IEEE\/CVF Conf. Comput. Vision Pattern Recognit., Salt Lake City,UT, USA, (2018), 1625\u20131634.","DOI":"10.1109\/CVPR.2018.00175"},{"key":"10.3233\/JIFS-211157_ref8","unstructured":"Liu Y. , Chen X. , Liu C. , Song D. , Delving into transferable adversarial examples and black-box attacks, In 5th International Conference on Learning Representations, ICLR (2017)."},{"key":"10.3233\/JIFS-211157_ref10","doi-asserted-by":"crossref","unstructured":"Dong Y. , et al., Boosting adversarial attacks with momentum, in Proc. IEEE\/CVF Conf. Comput. Vision Pattern Recognit., Salt Lake City, UT, USA, (2018), 9185\u20139193.","DOI":"10.1109\/CVPR.2018.00957"},{"key":"10.3233\/JIFS-211157_ref11","unstructured":"Kingma D.P. , Ba J. , Adam: A method for stochastic optimization. In Yoshua Bengio and Yann LeCun, editors, 3rd International Conference on Learning Representations, ICLR (2015)."},{"key":"10.3233\/JIFS-211157_ref12","unstructured":"Sutskever I. , Martens J. , Dahl G. , Hinton G. , On the importance of initialization and momentum in deep learning, in Proc. Int. Conf. Mach. Learn., Atlanta, GA, USA, (2013), 1139\u20131147."},{"issue":"3","key":"10.3233\/JIFS-211157_ref14","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","article-title":"Imagenet large scale visual recognition challenge","volume":"115","author":"Russakovsky","year":"2015","journal-title":"International Journal of Computer Vision"},{"key":"10.3233\/JIFS-211157_ref15","doi-asserted-by":"crossref","unstructured":"Xie C. , et al., Improving transferability of adversarial examples with input diversity, in Proc. IEEE Conf. Comput. Vision Pattern Recognit. (CVPR), Long Beach, CA, USA, (2019), 2725\u20132734.","DOI":"10.1109\/CVPR.2019.00284"},{"key":"10.3233\/JIFS-211157_ref16","unstructured":"Biggio B. , et al., Evasion attacks against machine learning at test time, in Proc. Mach. Learn. Knowl. Discovery Databases, Berlin, Heidelberg, (20130, 3876\u2013402."},{"key":"10.3233\/JIFS-211157_ref17","doi-asserted-by":"crossref","first-page":"4615","DOI":"10.3233\/JIFS-179295","article-title":"Generating adversarial examples for DNN using pooling layers","volume":"37","author":"Zhang","year":"2019","journal-title":"J Intell Fuzzy Syst"},{"key":"10.3233\/JIFS-211157_ref20","doi-asserted-by":"crossref","unstructured":"Papernot N. , McDaniel P. , Wu X. , Jha S. , Swami A. , Distillation as a defense to adversarial perturbations against deep neural networks, in Proc. IEEE Symp. Secur. Privacy, San Jose, CA, USA, (2016), 582\u2013597.","DOI":"10.1109\/SP.2016.41"},{"key":"10.3233\/JIFS-211157_ref22","unstructured":"Guo C. , Rana M. , Cisse M. , van der Maaten L. , Countering adversarial images using input transformations, In 6th International Conference on Learning Representations, ICLR (2018)."},{"key":"10.3233\/JIFS-211157_ref26","unstructured":"Cohen J.M. , Rosenfeld E. , Zico Kolter J. , Certified adversarial robustness via randomized smoothing, In K. Chaudhuri and R. Salakhutdinov, editors, Proceedings of the 36th International Conference on Machine Learning, ICML (2019), 1310\u20131320."},{"key":"10.3233\/JIFS-211157_ref28","doi-asserted-by":"crossref","unstructured":"Tram\u00e8r F. , Kurakin A. , Papernot N. , Boneh D. , McDaniel P. , Ensemble adversarial training: Attacks and defenses, In 6th International Conference on Learning Representations, ICLR (2018).","DOI":"10.1145\/3319535.3354222"},{"key":"10.3233\/JIFS-211157_ref29","doi-asserted-by":"crossref","first-page":"7085","DOI":"10.3233\/JIFS-200280","article-title":"GAN-based classifier protection against adversarial attacks","volume":"39","author":"Liu","year":"2020","journal-title":"J Intell Fuzzy Syst"},{"key":"10.3233\/JIFS-211157_ref30","doi-asserted-by":"crossref","unstructured":"Szegedy C. , Vanhoucke V. , Ioffe S. , Shlens J. , Wojna Z. , Rethinking the inception architecture for computer vision, in Proc. IEEE Conf. Comput.VisionPattern Recognit. (CVPR), Las Vegas, NV, USA, (2016), 2818\u20132826.","DOI":"10.1109\/CVPR.2016.308"},{"key":"10.3233\/JIFS-211157_ref31","doi-asserted-by":"crossref","unstructured":"Szegedy C. , Ioffe S. , Vanhoucke V. , Alemi A.A. , Inception-v4, inception-ResNet and the impact of residual connections on learning, presented at the AAAI Conf. Artif. Intell., San Francisco, California, USA, (2017).","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"10.3233\/JIFS-211157_ref32","doi-asserted-by":"crossref","unstructured":"He K. , Zhang X. , Ren S. , Sun J. , Identity mappings in deep residual networks, in Proc. Comput. Vision \u2013 ECCV 2016, Cham, (2016), 630\u2013645.","DOI":"10.1007\/978-3-319-46493-0_38"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-211157","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T13:00:11Z","timestamp":1769778011000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-211157"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,2]]},"references-count":23,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.3233\/jifs-211157","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,2]]}}}