{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T15:39:31Z","timestamp":1764603571737,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030196417"},{"type":"electronic","value":"9783030196424"}],"license":[{"start":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T00:00:00Z","timestamp":1556409600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-19642-4_19","type":"book-chapter","created":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T10:04:21Z","timestamp":1556359461000},"page":"189-199","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Robustness of Generalized Learning Vector Quantization Models Against Adversarial Attacks"],"prefix":"10.1007","author":[{"given":"Sascha","family":"Saralajew","sequence":"first","affiliation":[]},{"given":"Lars","family":"Holdijk","sequence":"additional","affiliation":[]},{"given":"Maike","family":"Rees","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Villmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,28]]},"reference":[{"key":"19_CR1","unstructured":"Goodfellow I, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. In: International conference on learning representations"},{"key":"19_CR2","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2014) Intriguing properties of neural networks. In: International conference on learning representations"},{"key":"19_CR3","unstructured":"Elsayed G, Krishnan D, Mobahi H, Regan K, Bengio S (2018) Large margin deep networks for classification. In: Advances in neural information processing systems, pp 850\u2013860"},{"key":"19_CR4","unstructured":"Stutz D, Hein M, Schiele B (2018) Disentangling adversarial robustness and generalization. arXiv preprint \n                    arXiv:1812.00740"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Kohonen T (1988) Learning vector quantization. Neural networks, 1(Supplement 1)","DOI":"10.1016\/0893-6080(88)90020-2"},{"key":"19_CR6","unstructured":"Sato A, Yamada K (1996) Generalized learning vector quantization. In: Advances in neural information processing systems, pp 423\u2013429"},{"key":"19_CR7","unstructured":"Crammer K, Gilad-Bachrach R, Navot A, Tishby N (2003) Margin analysis of the LVQ algorithm. In: Advances in neural information processing systems, pp 479\u2013486"},{"issue":"12","key":"19_CR8","doi-asserted-by":"publisher","first-page":"3532","DOI":"10.1162\/neco.2009.11-08-908","volume":"21","author":"P Schneider","year":"2009","unstructured":"Schneider P, Biehl M, Hammer B (2009) Adaptive relevance matrices in learning vector quantization. Neural Comput 21(12):3532\u20133561","journal-title":"Neural Comput"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Saralajew S, Villmann T (2016) Adaptive tangent distances in generalized learning vector quantization for transformation and distortion invariant classification learning. In: 2016 international joint conference on neural networks (IJCNN). IEEE, pp 2672\u20132679","DOI":"10.1109\/IJCNN.2016.7727534"},{"key":"19_CR10","unstructured":"Schott L, Rauber J, Bethge M, Brendel W (2019) Towards the first adversarially robust neural network model on MNIST. In: International conference on learning representations"},{"key":"19_CR11","unstructured":"Rauber J, Brendel W, Bethge M (2017) Foolbox: a python toolbox to benchmark the robustness of machine learning models. arXiv preprint \n                    arXiv:1707.04131"},{"key":"19_CR12","unstructured":"Kurakin A, Goodfellow I, Bengio S (2016) Adversarial examples in the physical world. arXiv preprint \n                    arXiv:1607.02533"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Dong Y, Liao F, Pang T, Su H, Zhu J, Hu X, Li J (2018) Boosting adversarial attacks with momentum. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 9185\u20139193","DOI":"10.1109\/CVPR.2018.00957"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli S-M, Fawzi A, Frossard P (2016) DeepFool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2574\u20132582","DOI":"10.1109\/CVPR.2016.282"},{"key":"19_CR15","unstructured":"Brendel W, Rauber J, Bethge M (2018) Decision-based adversarial attacks: reliable attacks against black-box machine learning models. In: Proceedings of the 6th international conference on learning representations"},{"key":"19_CR16","unstructured":"Kingma DP, Ba JL (2015) Adam: a method for stochastic optimization. In: Proceedings of the international conference on learning representations, pp 1\u201313"},{"key":"19_CR17","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2018) Towards deep learning models resistant to adversarial attacks. In: International conference on learning representations"},{"key":"19_CR18","unstructured":"Athalye A, Carlini N, Wagner D (2018) Obfuscated gradients give a false sense of security: circumventing defenses to adversarial examples. In: Proceedings of the 35th international conference on machine learning"},{"key":"19_CR19","unstructured":"Globerson A, Roweis S (2006) Metric learning by collapsing classes. In: Advances in neural information processing systems, pp 451\u2013458"},{"issue":"5","key":"19_CR20","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1109\/TNN.2010.2042729","volume":"21","author":"P Schneider","year":"2010","unstructured":"Schneider P, Bunte K, Stiekema H, Hammer B, Villmann T, Biehl M (2010) Regularization in matrix relevance learning. IEEE Trans Neural Netw 21(5):831\u2013840","journal-title":"IEEE Trans Neural Netw"},{"key":"19_CR21","unstructured":"Croce F, Andriushchenko M, Hein M (2018) Provable robustness of ReLU networks via maximization of linear regions. arXiv preprint \n                    arXiv:1810.07481"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Self-Organizing Maps, Learning Vector Quantization, Clustering and Data Visualization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-19642-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T03:48:39Z","timestamp":1558151319000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-19642-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,28]]},"ISBN":["9783030196417","9783030196424"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-19642-4_19","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,4,28]]},"assertion":[{"value":"28 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WSOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Self-Organizing Maps","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wsom2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/samm.univ-paris1.fr\/WSOM-2017","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}