{"links":{},"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00232535","sets":["1164:5159:11541:11549"]},"path":["11549"],"owner":"44499","recid":"232535","title":["Black-Box Adversarial Attack for Math Formula Recognition Model"],"pubdate":{"attribute_name":"公開日","attribute_value":"2024-02-22"},"_buckets":{"deposit":"49e24a99-45c8-4eb9-ba98-228c1506e053"},"_deposit":{"id":"232535","pid":{"type":"depid","value":"232535","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"Black-Box Adversarial Attack for Math Formula Recognition Model","author_link":["629631","629632","629636","629638","629637","629634","629633","629635"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Black-Box Adversarial Attack for Math Formula Recognition Model"},{"subitem_title":"Black-Box Adversarial Attack for Math Formula Recognition Model","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"SIP2","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2024-02-22","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Faculty of Science and Engineering, Doshisha University"},{"subitem_text_value":"Faculty of Science and Engineering, Doshisha University"},{"subitem_text_value":"Department of Information Engineering, University of Brescia"},{"subitem_text_value":"Faculty of Science and Engineering, Doshisha University"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Faculty of Science and Engineering, Doshisha University","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Science and Engineering, Doshisha University","subitem_text_language":"en"},{"subitem_text_value":"Department of Information Engineering, University of Brescia","subitem_text_language":"en"},{"subitem_text_value":"Faculty of Science and Engineering, Doshisha University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/232535/files/IPSJ-SLP24151065.pdf","label":"IPSJ-SLP24151065.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SLP24151065.pdf","filesize":[{"value":"1.3 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"22"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"ce6cb9bb-512c-4a46-b9e4-e4babda942b7","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"名村, 晴人"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"吉田, 正朋"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"アダミ, ニコラ"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"奥田, 正浩"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Haruto, Namura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masatomo, Yoshida","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Nicola, Adami","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masahiro, Okuda","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10442647","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8663","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Remarkable advances in deep learning have greatly improved the accuracy of image analysis. The progress of deep learning has significantly advanced the field of image analysis. However, concomitant with this advancement, the emergence of adversarial attacks aiming to deceive deep learning models has posed a significant challenge. While extensive research has focused on adversarial attacks, investigating such attacks targeting text recognition models, particularly optical character recognition (OCR), has remained largely unexplored. This paper presents a novel attack against a LaTeX OCR model designed to translate mathematical expression images into LaTeX code. Our method strategically exploits the characteristics of mathematical formula images by targeting filled areas containing text. This approach enables a computationally efficient attack on an image containing the mathematical formula.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Remarkable advances in deep learning have greatly improved the accuracy of image analysis. The progress of deep learning has significantly advanced the field of image analysis. However, concomitant with this advancement, the emergence of adversarial attacks aiming to deceive deep learning models has posed a significant challenge. While extensive research has focused on adversarial attacks, investigating such attacks targeting text recognition models, particularly optical character recognition (OCR), has remained largely unexplored. This paper presents a novel attack against a LaTeX OCR model designed to translate mathematical expression images into LaTeX code. Our method strategically exploits the characteristics of mathematical formula images by targeting filled areas containing text. This approach enables a computationally efficient attack on an image containing the mathematical formula.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"5","bibliographic_titles":[{"bibliographic_title":"研究報告音声言語情報処理(SLP)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2024-02-22","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"65","bibliographicVolumeNumber":"2024-SLP-151"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"updated":"2025-01-19T10:24:55.887295+00:00","created":"2025-01-19T01:33:27.555331+00:00","id":232535}