CRYPTOREPORTCLUB
  • Crypto news
  • AI
  • Technologies
Wednesday, July 2, 2025
No Result
View All Result
CRYPTOREPORTCLUB
  • Crypto news
  • AI
  • Technologies
No Result
View All Result
CRYPTOREPORTCLUB

RisingAttacK: New technique can make AI ‘see’ whatever you want

July 1, 2025
157
0

July 1, 2025

The GIST RisingAttacK: New technique can make AI 'see' whatever you want

Related Post

Apple weighs using Anthropic or OpenAI to power Siri in major reversal

Apple weighs using Anthropic or OpenAI to power Siri in major reversal

July 2, 2025
How can AI be more energy efficient? Researchers look to human brain for inspiration

How can AI be more energy efficient? Researchers look to human brain for inspiration

July 2, 2025
Lisa Lock

scientific editor

Robert Egan

associate editor

Editors' notes

This article has been reviewed according to Science X's editorial process and policies. Editors have highlighted the following attributes while ensuring the content's credibility:

fact-checked

trusted source

proofread

AI eye
Credit: AI-generated image

Researchers have demonstrated a new way of attacking artificial intelligence computer vision systems, allowing them to control what the AI "sees." The research shows that the new technique, called RisingAttacK, is effective at manipulating all of the most widely used AI computer vision systems.

At issue are so-called "adversarial attacks," in which someone manipulates the data being fed into an AI system to control what the system sees, or does not see, in an image. For example, someone might manipulate an AI's ability to detect traffic signals, pedestrians or other cars—which would cause problems for autonomous vehicles. Or a hacker could install code on an X-ray machine that causes an AI system to make inaccurate diagnoses.

"We wanted to find an effective way of hacking AI vision systems because these vision systems are often used in contexts that can affect human health and safety—from autonomous vehicles to health technologies to security applications," says Tianfu Wu, co-corresponding author of a paper on the work and an associate professor of electrical and computer engineering at North Carolina State University.

"That means it is very important for these AI systems to be secure. Identifying vulnerabilities is an important step in making these systems secure, since you must identify a vulnerability in order to defend against it."

RisingAttacK consists of a series of operations, with the goal of making the fewest changes to an image that will allow users to manipulate what the vision AI "sees."

First, RisingAttacK identifies all of the visual features in the image. The program also runs an operation to determine which of those features is most important to achieve the attack's goal.

"For example," says Wu, "if the goal of the attack is to stop the AI from identifying a car, what features in the image are most important for the AI to be able to identify a car in the image?"

RisingAttacK then calculates how sensitive the AI system is to changes in data and, more specifically, how sensitive the AI is to changes in data of the key features.

"This requires some computational power, but allows us to make very small, targeted changes to the key features that make the attack successful," Wu says. "The end result is that two images may look identical to human eyes, and we might clearly see a car in both images. But due to RisingAttacK, the AI would see a car in the first image but would not see a car in the second image.

"And the nature of RisingAttacK means we can influence the AI's ability to see any of the top 20 or 30 targets it was trained to identify. So, that might be a car, a pedestrian, a bicycle, a stop sign, and so on."

The researchers tested RisingAttacK against the four most commonly used vision AI programs: ResNet-50, DenseNet-121, ViTB and DEiT-B. The technique was effective at manipulating all four programs.

"While we demonstrated RisingAttacK's ability to manipulate vision models, we are now in the process of determining how effective the technique is at attacking other AI systems, such as large language models," Wu says.

"Moving forward, the goal is to develop techniques that can successfully defend against such attacks."

The paper, "Adversarial Perturbations Are Formed by Iteratively Learning Linear Combinations of the Right Singular Vectors of the Adversarial Jacobian," will be presented July 15 at the International Conference of Machine Learning (ICML 2025), being held in Vancouver, Canada.

More information: Paper: Adversarial Perturbations Are Formed by Iteratively Learning Linear Combinations of the Right Singular Vectors of the Adversarial Jacobian

Provided by North Carolina State University Citation: RisingAttacK: New technique can make AI 'see' whatever you want (2025, July 1) retrieved 1 July 2025 from https://techxplore.com/news/2025-07-risingattack-technique-ai.html This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.

Explore further

AI networks are more vulnerable to malicious attacks than previously thought 0 shares

Feedback to editors

Share212Tweet133ShareShare27ShareSend

Related Posts

Apple weighs using Anthropic or OpenAI to power Siri in major reversal
AI

Apple weighs using Anthropic or OpenAI to power Siri in major reversal

July 2, 2025
0

July 1, 2025 The GIST Apple weighs using Anthropic or OpenAI to power Siri in major reversal Sadie Harley scientific editor Andrew Zinin lead editor Editors' notes This article has been reviewed according to Science X's editorial process and policies. Editors have highlighted the following attributes while ensuring the content's...

Read moreDetails
How can AI be more energy efficient? Researchers look to human brain for inspiration

How can AI be more energy efficient? Researchers look to human brain for inspiration

July 2, 2025
Line judges missed at Wimbledon as AI takes their jobs

Line judges missed at Wimbledon as AI takes their jobs

July 2, 2025
New framework guides ethical use of AI in financial decision-making

New framework guides ethical use of AI in financial decision-making

July 1, 2025
AI-driven lifecycle management for end-of-life household appliances

AI-driven lifecycle management for end-of-life household appliances

July 1, 2025
Understanding the ‘Slopocene’: How the failures of AI can reveal its inner workings

Understanding the ‘Slopocene’: How the failures of AI can reveal its inner workings

July 1, 2025
AI won’t replace computer scientists any time soon—here are 10 reasons why

AI won’t replace computer scientists any time soon—here are 10 reasons why

July 1, 2025

Recent News

The best laptop you can buy in 2025

The best laptop you can buy in 2025

July 2, 2025
Pudgy Penguins surges 64% in a week — What’s driving PENGU token rally?

Pudgy Penguins surges 64% in a week — What’s driving PENGU token rally?

July 2, 2025
Xbox’s first Game Pass additions for July include Tony Hawk’s Pro Skater 3 + 4

Xbox’s first Game Pass additions for July include Tony Hawk’s Pro Skater 3 + 4

July 2, 2025
Apple TV’s MLS Season Pass is half off for the rest of the season.

Apple TV’s MLS Season Pass is half off for the rest of the season.

July 2, 2025

TOP News

  • Apple details new fee structures for App Store payments in the EU

    Apple details new fee structures for App Store payments in the EU

    540 shares
    Share 216 Tweet 135
  • Top 5 Tokenized Real Estate Platforms Transforming Property Investment

    535 shares
    Share 214 Tweet 134
  • Buying Art from a Gallery. A Guide to Making the Right Choice

    534 shares
    Share 214 Tweet 134
  • New Pokémon Legends: Z-A trailer reveals a completely large model of Lumiose Metropolis

    564 shares
    Share 226 Tweet 141
  • Bitcoin Bullishness For Q3 Grows: What Happens In Every Post-Halving Year?

    534 shares
    Share 214 Tweet 134
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Use
Advertising: digestmediaholding@gmail.com

Disclaimer: Information found on cryptoreportclub.com is those of writers quoted. It does not represent the opinions of cryptoreportclub.com on whether to sell, buy or hold any investments. You are advised to conduct your own research before making any investment decisions. Use provided information at your own risk.
cryptoreportclub.com covers fintech, blockchain and Bitcoin bringing you the latest crypto news and analyses on the future of money.

© 2023-2025 Cryptoreportclub. All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Crypto news
  • AI
  • Technologies

Disclaimer: Information found on cryptoreportclub.com is those of writers quoted. It does not represent the opinions of cryptoreportclub.com on whether to sell, buy or hold any investments. You are advised to conduct your own research before making any investment decisions. Use provided information at your own risk.
cryptoreportclub.com covers fintech, blockchain and Bitcoin bringing you the latest crypto news and analyses on the future of money.

© 2023-2025 Cryptoreportclub. All Rights Reserved