Intelligent Systems with Applications最新文献

筛选
英文 中文
Vehicle route optimizer for waste collection and routing optimization problem 车辆路线优化器用于垃圾收集和路线优化问题
IF 4.3
Intelligent Systems with Applications Pub Date : 2025-07-29 DOI: 10.1016/j.iswa.2025.200521
Hussam Fakhouri , Amjad Hudaib , Faten Hamad , Sandi Fakhouri , Niveen Halalsheh , Mohannad S. Alkhalaileh
{"title":"Vehicle route optimizer for waste collection and routing optimization problem","authors":"Hussam Fakhouri ,&nbsp;Amjad Hudaib ,&nbsp;Faten Hamad ,&nbsp;Sandi Fakhouri ,&nbsp;Niveen Halalsheh ,&nbsp;Mohannad S. Alkhalaileh","doi":"10.1016/j.iswa.2025.200521","DOIUrl":"10.1016/j.iswa.2025.200521","url":null,"abstract":"<div><div>This paper introduces a novel dynamic optimization strategy called the Vehicle Route Optimizer (VRO), specifically designed to enhance the efficiency and sustainability of smart cities. Inspired by the dynamics and interactions observed in vehicle behavior and traffic systems, VRO effectively balances exploration and exploitation phases to discover optimal solutions. The algorithm has been rigorously tested using the IEEE CEC2022 benchmark suites, demonstrating its superior performance compared to 18 other optimizers. In smart cities, efficient waste management and routing are critical for reducing operational costs and minimizing environmental impact. Thus, VRO has been applied to solve the Waste Collection and Routing Optimization Problem (WCROP) in smart cities by integrating bin allocation and routing components into a single-objective optimization framework. In addressing WCROP in Smart Cities, VRO was evaluated using synthetic instances derived from PVRP-IF cases. The results show that VRO outperforms traditional hierarchical and heuristic methods in terms of total cost, computational efficiency, and solution feasibility.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"27 ","pages":"Article 200521"},"PeriodicalIF":4.3,"publicationDate":"2025-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144738302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Paranasal sinus analysis based on deep learning and machine learning techniques: A comprehensive survey 基于深度学习和机器学习技术的鼻窦分析:综合调查
Intelligent Systems with Applications Pub Date : 2025-07-18 DOI: 10.1016/j.iswa.2025.200559
Ali Alsalama, Saad Harous, Ashraf Elnagar
{"title":"Paranasal sinus analysis based on deep learning and machine learning techniques: A comprehensive survey","authors":"Ali Alsalama,&nbsp;Saad Harous,&nbsp;Ashraf Elnagar","doi":"10.1016/j.iswa.2025.200559","DOIUrl":"10.1016/j.iswa.2025.200559","url":null,"abstract":"<div><div>This survey provides an in-depth review of recent advancements in forensic anthropology through the application of imaging and modeling techniques for paranasal sinus structures. The focus is on exploring various studies that leverage the paranasal sinuses for the identification of individuals and demographic analysis, including age and gender estimation, especially when traditional methods such as fingerprint analysis, dental records, or DNA profiling are not feasible. Additionally, the survey aims to serve as a foundation for future work in similar analyses and segmentation tasks. These methods are especially useful in forensic contexts, such as those involving skeletonized remains where other anatomical structures are absent. The paper discusses several case studies, including the segmentation of paranasal sinuses as well as their classification for establishing biological profiles in diverse populations. The effectiveness of these 3D modeling approaches in predicting demographic characteristics such as sex, age, and ethnicity is also highlighted. Special emphasis is placed on the robustness and reliability of sinus morphology as both a forensic identifier and a tool for demographic inference.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"27 ","pages":"Article 200559"},"PeriodicalIF":0.0,"publicationDate":"2025-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144679030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel binary Stellar Oscillation Optimizer for feature selection optimization problems 一种用于特征选择优化问题的新型双星振荡优化器
Intelligent Systems with Applications Pub Date : 2025-07-16 DOI: 10.1016/j.iswa.2025.200558
Ali Rodan , Sharif Naser Makhadmeh , Yousef Sanjalawe , Rizik M.H. Al-Sayyed , Mohammed Azmi Al-Betar
{"title":"A novel binary Stellar Oscillation Optimizer for feature selection optimization problems","authors":"Ali Rodan ,&nbsp;Sharif Naser Makhadmeh ,&nbsp;Yousef Sanjalawe ,&nbsp;Rizik M.H. Al-Sayyed ,&nbsp;Mohammed Azmi Al-Betar","doi":"10.1016/j.iswa.2025.200558","DOIUrl":"10.1016/j.iswa.2025.200558","url":null,"abstract":"<div><div>Stellar Oscillation Optimizer (SOO) takes its core inspiration from the study of stellar pulsations, a domain often referred to as asteroseismology which is formulated as an optimization algorithm for continuous domain. In this paper, the Binary version of Stellar Oscillation Optimizer (BSOO) is proposed for Feature Selection (FS) problems. BSOO introduces binary adaptations, including threshold-based encoding, controlled oscillatory movements, and a top-solution influence mechanism. In order to evaluate the BSOO, sixteen FS datasets are used with different numbers of features, samples, and class labels. Seven performance measures are also used, which are: fitness value, number of selected features, accuracy, sensitivity, specificity, Precision, and F-measure. An intensive comparative evaluation against 18 state-of-the-art optimization algorithms using the same datasets has been conducted. The results show that the proposed BSOO version is able to compete well with the other FS-based methods where it is able to overcome several methods and produce the best overall results for some datasets on different measurements. Furthermore, the convergence behavior to show the optimization behavior of BSOO during the search is investigated and visualized. Interestingly, the BSOO is able to provide a suitable trade-off between the global wide-range exploration and local nearby exploitation during the optimization process. This is proved using the statistical Wilcoxon Rank-Sum Test Results. In conclusion, this paper provides a new alternative solution for FS research community that is able to work well for many FS instances and find the optimal solution. The source code of BSOO is publicly available for both MATLAB at: <span><span>https://www.mathworks.com/matlabcentral/fileexchange/180096-bsoo-binary-stellar-oscillation-optimizer</span><svg><path></path></svg></span> and PYTHON at: <span><span>https://github.com/AliRodan/BSOO-Binary-Stellar-Oscillation-Optimizer</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"27 ","pages":"Article 200558"},"PeriodicalIF":0.0,"publicationDate":"2025-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144694572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monkeypox optimizer: A TinyML bio-inspired evolutionary optimization algorithm and its engineering applications 猴痘优化器:TinyML生物启发的进化优化算法及其工程应用
Intelligent Systems with Applications Pub Date : 2025-07-15 DOI: 10.1016/j.iswa.2025.200557
Marwa F. Mohamed , Ahmed Hamed
{"title":"Monkeypox optimizer: A TinyML bio-inspired evolutionary optimization algorithm and its engineering applications","authors":"Marwa F. Mohamed ,&nbsp;Ahmed Hamed","doi":"10.1016/j.iswa.2025.200557","DOIUrl":"10.1016/j.iswa.2025.200557","url":null,"abstract":"<div><div>High-dimensional optimization remains a key challenge in computational intelligence, especially under resource constraints. Evolutionary algorithms, which mimic the change in heritable characteristics of biological populations, have been proposed to address this. These algorithms apply selection pressure to favor better solutions over generations, and stochastic variations may occasionally introduce suboptimal candidates to preserve population diversity. However, they often struggle to balance exploration and exploitation, leading to suboptimal solutions, premature convergence, and significant computational demands, making them unsuitable for resource-constrained environments. This paper introduces Monkeypox Optimization (MO), a novel evolutionary algorithm inspired by the infection and replication lifecycle of the monkeypox virus. MO mimics the virus’s rapid spread by employing virus-to-cell infection, where the virus persistently seeks out vulnerable cells to penetrate—representing global exploration of the search space. Once inside, cell-to-cell transmission enables fast local propagation, modeling the refinement of high-potential solutions through accelerated replication. To conserve resources, MO continuously deletes the least effective virion copies, maintaining a compact and memory-efficient population. This biologically grounded design not only accelerates convergence but also aligns MO with TinyML principles, making it ideally suited for low-power, resource-constrained IoT environments. MO is benchmarked against 21 recent algorithms across 90 functions from CEC-2017, CEC-2019, and CEC-2020, and validated on three engineering design problems. Results show MO achieves up to 13% lower energy consumption and 34% shorter execution time compared to state-of-the-art competitors, while maintaining robust accuracy. A theoretical analysis reveals MO’s time complexity is <span><math><mrow><mi>O</mi><mrow><mo>(</mo><mi>m</mi><mi>n</mi><mo>+</mo><mi>R</mi><mi>T</mi><mi>n</mi><mo>)</mo></mrow></mrow></math></span>, confirming its scalability. Statistical validation via Friedman and Fisher tests further supports MO’s performance gains.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"27 ","pages":"Article 200557"},"PeriodicalIF":0.0,"publicationDate":"2025-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144687060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A unified DNN weight compression framework using reweighted optimization methods 采用重加权优化方法的统一DNN权压缩框架
Intelligent Systems with Applications Pub Date : 2025-07-12 DOI: 10.1016/j.iswa.2025.200556
Mengchen Fan , Tianyun Zhang , Xiaolong Ma , Jiacheng Guo , Zheng Zhan , Shanglin Zhou , Minghai Qin , Caiwen Ding , Baocheng Geng , Makan Fardad , Yanzhi Wang
{"title":"A unified DNN weight compression framework using reweighted optimization methods","authors":"Mengchen Fan ,&nbsp;Tianyun Zhang ,&nbsp;Xiaolong Ma ,&nbsp;Jiacheng Guo ,&nbsp;Zheng Zhan ,&nbsp;Shanglin Zhou ,&nbsp;Minghai Qin ,&nbsp;Caiwen Ding ,&nbsp;Baocheng Geng ,&nbsp;Makan Fardad ,&nbsp;Yanzhi Wang","doi":"10.1016/j.iswa.2025.200556","DOIUrl":"10.1016/j.iswa.2025.200556","url":null,"abstract":"<div><div>To address the large model sizes and intensive computation requirements of deep neural networks (DNNs), weight pruning techniques have been proposed and generally fall into two categories: static regularization-based pruning and dynamic regularization-based pruning. However, the static method often leads to either complex operations or reduced accuracy, while the dynamic method requires extensive time to adjust parameters to maintain accuracy while achieving effective pruning. In this paper, we propose a unified robustness-aware framework for DNN weight pruning that dynamically updates regularization terms bounded by the designated constraint. This framework can generate both non-structured sparsity and different kinds of structured sparsity, and it incorporates adversarial training to enhance the robustness of the sparse model. We further extend our approach into an integrated framework capable of handling multiple DNN compression tasks. Experimental results show that our proposed method increases the compression rate – up to <span><math><mrow><mn>630</mn><mo>×</mo></mrow></math></span> for LeNet-5, <span><math><mrow><mn>45</mn><mo>×</mo></mrow></math></span> for AlexNet, <span><math><mrow><mn>7</mn><mo>.</mo><mn>2</mn><mo>×</mo></mrow></math></span> for MobileNet, <span><math><mrow><mn>3</mn><mo>.</mo><mn>2</mn><mo>×</mo></mrow></math></span> for ResNet-50 – while also reducing training time and simplifying hyperparameter tuning to a <strong>single penalty parameter</strong>. Additionally, our method improves model robustness by <strong>5.07%</strong> for ResNet-18 and <strong>3.34%</strong> for VGG-16 under a 16×pruning rate, outperforming the state-of-the-art ADMM-based hard constraint method.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"27 ","pages":"Article 200556"},"PeriodicalIF":0.0,"publicationDate":"2025-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144614543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodology for advanced time series demand forecasting: A hybrid model of decomposition and deep learning 高级时间序列需求预测方法:分解与深度学习混合模型
IF 4.3
Intelligent Systems with Applications Pub Date : 2025-07-10 DOI: 10.1016/j.iswa.2025.200540
Juyoung Ha , Sungwon Lee , Sooyeon Jeong , Doohee Chung
{"title":"Methodology for advanced time series demand forecasting: A hybrid model of decomposition and deep learning","authors":"Juyoung Ha ,&nbsp;Sungwon Lee ,&nbsp;Sooyeon Jeong ,&nbsp;Doohee Chung","doi":"10.1016/j.iswa.2025.200540","DOIUrl":"10.1016/j.iswa.2025.200540","url":null,"abstract":"<div><div>Advancements in data science have increasingly focused on refining time-series predictive models for effective corporate management and demand forecasting. Traditional models often struggle to capture irregular patterns in time-series data. In this study, we employ a novel hybrid model integrating Ensemble Empirical Mode Decomposition (EEMD), Least Absolute Shrinkage and Selection Operator (LASSO), and Long Short-Term Memory (LSTM) networks to address these challenges. Our approach follows a structured pipeline: EEMD decomposes time-series data into ensemble Intrinsic Mode Functions (eIMFs) to reveal complex patterns, LASSO selects the most relevant features to optimize input variables, and LSTM captures long-term dependencies for accurate demand forecasting. We evaluate our model on real-world demand data from three industries (Office Product, Packaging Materials, and Pharmaceuticals), comparing it against ARIMAX, LightGBM, LSTM, and their EEMD-enhanced variants using NRMSE, NMAE, and R<span><math><msup><mrow></mrow><mrow><mn>2</mn></mrow></msup></math></span>. Results show that integrating EEMD into baseline models reduces NRMSE by an average of 27.4%, while the additional incorporation of LASSO further improves performance, achieving a total reduction of 29.1%. Compared to the standalone LSTM model, our proposed EEMD-LASSO-LSTM model demonstrates a substantial NRMSE reduction of 51.2%, highlighting its superior predictive accuracy. This innovative combination of EEMD, LASSO, and LSTM enables our proposed method to effectively capture the irregular patterns of demand, a task that has been a significant hurdle for conventional forecasting methods. The integration of EEMD, LASSO, and LSTM marks a significant advancement in time-series predictive modeling, enhancing demand forecasting and informing strategic corporate decisions.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"27 ","pages":"Article 200540"},"PeriodicalIF":4.3,"publicationDate":"2025-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144738121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual question answering for medical diagnosis 用于医学诊断的视觉问答
Intelligent Systems with Applications Pub Date : 2025-07-09 DOI: 10.1016/j.iswa.2025.200545
Nawel Ben Chaabane, Mohamed Bal-Ghaoui
{"title":"Visual question answering for medical diagnosis","authors":"Nawel Ben Chaabane,&nbsp;Mohamed Bal-Ghaoui","doi":"10.1016/j.iswa.2025.200545","DOIUrl":"10.1016/j.iswa.2025.200545","url":null,"abstract":"<div><div>The use of Artificial Intelligence (AI) in medical diagnosis is a breakthrough in healthcare, improving both accuracy and efficiency. Recently, a significant advancement has been made toward the development of multimodal AI systems that can process and integrate multiple types of data or modalities. This ability is key for interpreting medical images, such as X-rays, CT, and MRI scans, as well as textual data like electronic health records (EHRs) and clinical notes. In this era, Visual Question Answering (VQA) systems have demonstrated a potential use case in the medical domain. These systems, typically based on Vision-Language Models (VLMs), can answer natural lan- guage questions based on medical images, offering precise and relevant re- sponses that help doctors make better decisions.</div><div>In this article, we evaluate existing medical VQA models along with general and trending ones to make medical diagnoses. In particular, we focus on addressing abnormality questions considered challenging in the literature. Our approach consists of evaluating the Zero-Shot (ZS) general and domain-specific capabilities of different models using two created datasets, and fine-tuning the best-found models on the training set of the abnormality dataset before evaluating their performances quantitatively and qualitatively. IdeficMed, a generative domain-specific model, achieved better consistency and VQA outcomes by only training 0.22 % of its parameters. Additionally, we employed uncertainty quantification techniques (e.g., Monte Carlo dropout) to assess the confidence of the fine-tuned models in their predictions. We also conducted a sensitivity analysis on input perturbations, such as image noise and ambiguous questions.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"27 ","pages":"Article 200545"},"PeriodicalIF":0.0,"publicationDate":"2025-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144703262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On adversarial attack detection in the artificial intelligence era: Fundamentals, a taxonomy, and a review 关于人工智能时代的对抗性攻击检测:基础,分类和回顾
Intelligent Systems with Applications Pub Date : 2025-07-07 DOI: 10.1016/j.iswa.2025.200554
Noora Al Roken , Hakim Hacid , Ahmed Bouridane , Abir Hussain
{"title":"On adversarial attack detection in the artificial intelligence era: Fundamentals, a taxonomy, and a review","authors":"Noora Al Roken ,&nbsp;Hakim Hacid ,&nbsp;Ahmed Bouridane ,&nbsp;Abir Hussain","doi":"10.1016/j.iswa.2025.200554","DOIUrl":"10.1016/j.iswa.2025.200554","url":null,"abstract":"<div><div>The rapid advancement and sophisticated deployment of artificial intelligence tools by malicious actors have led to the rise of highly complex cyber-attacks that evolve quickly. This rapid evolution has made traditional defense systems increasingly ineffective at detecting and mitigating these hidden threats. Adversarial attacks are a prime example of such sophisticated cyber-attacks; they subtly alter attack patterns to evade detection by intelligent systems while still maintaining their harmful functionality. This paper provides a comprehensive overview of computer malware, examining both traditional concealment methods and more advanced adversarial techniques. It includes an in-depth analysis of recent research efforts aimed at detecting previously unseen adversarial attacks using both traditional and AI-driven approaches. Furthermore, this study discusses the limitations of current network intrusion detection systems and proposes directions for future research.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"27 ","pages":"Article 200554"},"PeriodicalIF":0.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144580839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cancelable random masking with deep learning for secure and interpretable finger vein authentication 可取消的随机掩蔽与深度学习的安全和可解释的手指静脉认证
Intelligent Systems with Applications Pub Date : 2025-07-07 DOI: 10.1016/j.iswa.2025.200552
Mohamed Hammad , Abdelhamied A. Ateya , Mohammed ElAffendi , Ahmed A. Abd El-Latif
{"title":"Cancelable random masking with deep learning for secure and interpretable finger vein authentication","authors":"Mohamed Hammad ,&nbsp;Abdelhamied A. Ateya ,&nbsp;Mohammed ElAffendi ,&nbsp;Ahmed A. Abd El-Latif","doi":"10.1016/j.iswa.2025.200552","DOIUrl":"10.1016/j.iswa.2025.200552","url":null,"abstract":"<div><div>In the area of identity verification and authentication, biometrics has emerged as a reliable means of recognizing individuals based on their unique behavioral or physical characteristics. Finger vein authentication, with its robustness, resistance to spoofing, and stable patterns, has gained significant attention as a biometric modality. This paper introduces a novel framework that integrates Cancelable Random Masking (CRM) with a lightweight deep learning model for secure and interpretable finger vein authentication. The CRM technique transforms biometric templates using cryptographic random masks, ensuring cancelability, revocability, and privacy. These transformed templates are then processed by a convolutional neural network (CNN) designed to learn discriminative features directly from masked inputs without relying on handcrafted feature extraction. Our method enhances transparency by making the transformation process interpretable and provides strong security against template inversion and adversarial attacks. Results conducted on three publicly available databases demonstrate the proposed framework’s superior performance in terms of accuracy, robustness, and resistance to spoofing and replay attacks. This is the first framework to integrate CRM within a deep learning model, satisfying all cancelable biometric criteria while enabling real-time, interpretable, and secure finger vein authentication.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"27 ","pages":"Article 200552"},"PeriodicalIF":0.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144580838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Certified Accuracy and Robustness: How different architectures stand up to adversarial attacks 认证的准确性和健壮性:不同的架构如何经受对抗性攻击
Intelligent Systems with Applications Pub Date : 2025-07-07 DOI: 10.1016/j.iswa.2025.200555
Azryl Elmy Sarih , Nagender Aneja , Ong Wee Hong
{"title":"Certified Accuracy and Robustness: How different architectures stand up to adversarial attacks","authors":"Azryl Elmy Sarih ,&nbsp;Nagender Aneja ,&nbsp;Ong Wee Hong","doi":"10.1016/j.iswa.2025.200555","DOIUrl":"10.1016/j.iswa.2025.200555","url":null,"abstract":"<div><div>Adversarial attacks are a concern for image classification using neural networks. Numerous methods have been created to minimize the effects of attacks, where the best defense against such attacks is through adversarial training, which has proven to be the most successful to date. Due to the nature of adversarial attacks, it is difficult to assess the capabilities of a network to defend. The standard method of assessing a network’s performance in supervised image classification tasks is based on accuracy. However, this assessment method, while still important, is insufficient when adversarial attacks are included. A new metric called certified accuracy is used to assess network performance when samples are perturbed by adversarial noise. This paper supplements certified accuracy with an abstention rate to give more insight into the network’s robustness. Abstention rate measures the percentage of the network that failed to keep its prediction unchanged as the perturbation strength increases from zero to specified strength. The study focuses on popular and good-performing CNN-based architectures, specifically EfficientNet-B7, ResNet-50, ResNet-101, Wide-ResNet-101, and transformer architectures such as CaiT and ViT-B/16. The selected architectures are trained in adversarial and standard methods and then certified on CIFAR-10 datasets perturbed with Gaussian noises of different strengths. Our results show that transformers are more resilient to adversarial attacks than CNN-based architectures by a significant margin. Transformers exhibit better certified accuracy and tolerance against stronger noises than CNN-based architectures, demonstrating good robustness with and without adversarial training. The width and depth of a network have little effect on achieving robustness against adversarial attacks, but rather, the techniques that are deployed in the network are more impactful, where attention mechanisms have been shown to improve a network’s robustness.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"27 ","pages":"Article 200555"},"PeriodicalIF":0.0,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144597230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信