{"id":26708,"date":"2025-07-07T14:29:40","date_gmt":"2025-07-07T14:29:40","guid":{"rendered":"https:\/\/www.tun.com\/home\/?p=26708"},"modified":"2025-07-07T14:29:41","modified_gmt":"2025-07-07T14:29:41","slug":"new-attack-manipulates-ai-vision-systems-exposing-critical-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.tun.com\/home\/new-attack-manipulates-ai-vision-systems-exposing-critical-vulnerabilities\/","title":{"rendered":"New Attack Manipulates AI Vision Systems, Exposing Critical Vulnerabilities"},"content":{"rendered":"\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-uagb-blockquote uagb-block-e7eb3fc3 uagb-blockquote__skin-border uagb-blockquote__stack-img-none\"><blockquote class=\"uagb-blockquote\"><div class=\"uagb-blockquote__content\">Scientists at NC State University have developed RisingAttacK, a technique that manipulates AI vision systems, revealing critical vulnerabilities. This advancement could impact autonomous vehicles, medical diagnostics and more, highlighting the need for robust AI security measures.<\/div><footer><div class=\"uagb-blockquote__author-wrap uagb-blockquote__author-at-left\"><\/div><\/footer><\/blockquote><\/div>\n\n\n\n<div class=\"wp-block-group is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-0dfbf163 wp-block-group-is-layout-flex\"><div style=\"font-size:16px;\" class=\"has-text-align-left wp-block-post-author\"><div class=\"wp-block-post-author__content\"><p class=\"wp-block-post-author__name\">The University Network<\/p><\/div><\/div>\n\n\n<div class=\"wp-block-uagb-social-share uagb-social-share__outer-wrap uagb-social-share__layout-horizontal uagb-block-ee584a31\">\n<div class=\"wp-block-uagb-social-share-child uagb-ss-repeater uagb-ss__wrapper uagb-block-ec619ce7\"><span class=\"uagb-ss__link\" data-href=\"https:\/\/www.facebook.com\/sharer.php?u=\" tabindex=\"0\" role=\"button\" aria-label=\"facebook\"><span class=\"uagb-ss__source-wrap\"><span class=\"uagb-ss__source-icon\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M504 256C504 119 393 8 256 8S8 119 8 256c0 123.8 90.69 226.4 209.3 245V327.7h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.28c-30.8 0-40.41 19.12-40.41 38.73V256h68.78l-11 71.69h-57.78V501C413.3 482.4 504 379.8 504 256z\"><\/path><\/svg><\/span><\/span><\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-social-share-child uagb-ss-repeater uagb-ss__wrapper uagb-block-32d99934\"><span class=\"uagb-ss__link\" data-href=\"https:\/\/twitter.com\/share?url=\" tabindex=\"0\" role=\"button\" aria-label=\"twitter\"><span class=\"uagb-ss__source-wrap\"><span class=\"uagb-ss__source-icon\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M389.2 48h70.6L305.6 224.2 487 464H345L233.7 318.6 106.5 464H35.8L200.7 275.5 26.8 48H172.4L272.9 180.9 389.2 48zM364.4 421.8h39.1L151.1 88h-42L364.4 421.8z\"><\/path><\/svg><\/span><\/span><\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-social-share-child uagb-ss-repeater uagb-ss__wrapper uagb-block-1d136f14\"><span class=\"uagb-ss__link\" data-href=\"https:\/\/www.linkedin.com\/shareArticle?url=\" tabindex=\"0\" role=\"button\" aria-label=\"linkedin\"><span class=\"uagb-ss__source-wrap\"><span class=\"uagb-ss__source-icon\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"><\/path><\/svg><\/span><\/span><\/span><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<p>Researchers at North Carolina State University have unveiled a new method that exposes vulnerabilities in artificial intelligence (AI) vision systems, enabling the control of what these systems &#8220;see.&#8221; Named RisingAttacK, this technique is effective in manipulating the most widely deployed AI computer vision systems, raising significant implications for security and safety across various sectors.<\/p>\n\n\n\n<p>RisingAttacK specifically targets \u201cadversarial attacks,\u201d where data fed into an AI system is manipulated to alter its perception. Such attacks are particularly concerning for applications like autonomous vehicles and medical diagnostics, where erroneous interpretations could lead to real-world dangers.<\/p>\n\n\n\n<p>&#8220;We wanted to find an effective way of hacking AI vision systems because these vision systems are often used in contexts that can affect human health and safety \u2014 from autonomous vehicles to health technologies to security applications,\u201d co-corresponding author Tianfu Wu, an associate professor of electrical and computer engineering at NC State, said in a news release. \u201cThat means it is very important for these AI systems to be secure. Identifying vulnerabilities is an important step in making these systems secure since you must identify a vulnerability in order to defend against it.\u201d<\/p>\n\n\n\n<p>RisingAttacK operates through a series of steps aimed at making minimal changes to an image to manipulate what the AI perceives. Initially, it identifies all visual features in the image and determines which are most crucial for the attack&#8217;s objectives. <\/p>\n\n\n\n<p>&#8220;For example, if the goal of the attack is to stop the AI from identifying a car, what features in the image are most important for the AI to be able to identify a car in the image?&#8221; Wu added.<\/p>\n\n\n\n<p>Subsequently, RisingAttacK analyzes how sensitive the AI system is to changes in these key features. This targeted manipulation means that while two images might appear identical to humans, the AI could be deceived into making different identifications. <\/p>\n\n\n\n<p>&#8220;The end result is that two images may look identical to human eyes, and we might clearly see a car in both images. But due to RisingAttacK, the AI would see a car in the first image but would not see a car in the second image,&#8221; added Wu.<\/p>\n\n\n\n<p>Tests showed RisingAttacK&#8217;s effectiveness across four prominent vision AI programs: ResNet-50, DenseNet-121, ViTB and DEiT-B. The researchers are now exploring how this method could affect other AI systems, including large language models. <\/p>\n\n\n\n<p>&#8220;While we demonstrated RisingAttacK\u2019s ability to manipulate vision models, we are now in the process of determining how effective the technique is at attacking other AI systems, such as large language models,&#8221; Wu added. &#8220;Moving forward, the goal is to develop techniques that can successfully defend against such attacks.&#8221;<\/p>\n\n\n\n<p>The findings will be <a href=\"https:\/\/icml.cc\/virtual\/2025\/poster\/46521\" target=\"_blank\" rel=\"noopener\" title=\"\">presented<\/a> on July 15 at the International Conference of Machine Learning in Vancouver, Canada. <\/p>\n\n\n\n<p>For the benefit of the research community, the researchers have made RisingAttacK <a href=\"https:\/\/github.com\/ivmcl\/ordered-topk-attack\" target=\"_blank\" rel=\"noopener\" title=\"\">publicly available<\/a> on GitHub, allowing others to test their neural networks for vulnerabilities.<\/p>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Source: <\/strong><a href=\"https:\/\/news.ncsu.edu\/2025\/07\/rising-attack-targets-ai\/\" target=\"_blank\" rel=\"noopener\" title=\"\">North Carolina State University<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers at North Carolina State University have unveiled a new method that exposes vulnerabilities in artificial intelligence (AI) vision systems, enabling the control of what these systems &#8220;see.&#8221; Named RisingAttacK, this technique is effective in manipulating the most widely deployed AI computer vision systems, raising significant implications for security and safety across various sectors. RisingAttacK [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"single-no-separators","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[69],"class_list":["post-26708","post","type-post","status-publish","format-standard","hentry","category-ai","tag-nc-state-university"],"acf":[],"aioseo_notices":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"The University Network","author_link":"https:\/\/www.tun.com\/home\/author\/funky_junkie\/"},"uagb_comment_info":0,"uagb_excerpt":"Researchers at North Carolina State University have unveiled a new method that exposes vulnerabilities in artificial intelligence (AI) vision systems, enabling the control of what these systems &#8220;see.&#8221; Named RisingAttacK, this technique is effective in manipulating the most widely deployed AI computer vision systems, raising significant implications for security and safety across various sectors. RisingAttacK&hellip;","_links":{"self":[{"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/posts\/26708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/comments?post=26708"}],"version-history":[{"count":8,"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/posts\/26708\/revisions"}],"predecessor-version":[{"id":26722,"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/posts\/26708\/revisions\/26722"}],"wp:attachment":[{"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/media?parent=26708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/categories?post=26708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/tags?post=26708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}