{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T12:46:59Z","timestamp":1750337219838,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030297251"},{"type":"electronic","value":"9783030297268"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-29726-8_18","type":"book-chapter","created":{"date-parts":[[2019,8,22]],"date-time":"2019-08-22T20:04:56Z","timestamp":1566504296000},"page":"285-300","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Backdoor Attacks in Neural Networks \u2013 A Systematic Evaluation on Multiple Traffic Sign Datasets"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3794-1694","authenticated-orcid":false,"given":"Huma","family":"Rehman","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3682-1364","authenticated-orcid":false,"given":"Andreas","family":"Ekelhart","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0424-5999","authenticated-orcid":false,"given":"Rudolf","family":"Mayer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,23]]},"reference":[{"key":"18_CR1","unstructured":"Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., Shmatikov, V.: How to backdoor federated learning. CoRR abs\/1807.00459 (2018). http:\/\/arxiv.org\/abs\/1807.00459"},{"key":"18_CR2","unstructured":"Chen, X., Liu, C., Li, B., Lu, K., Song, D.: Targeted backdoor attacks on deep learning systems using data poisoning. CoRR abs\/1712.05526 (2017). http:\/\/arxiv.org\/abs\/1712.05526"},{"key":"18_CR3","unstructured":"Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In: International Conference on Computer Vision & Pattern Recognition (CVPR 2005), vol. 1, pp. 886\u2013893. IEEE Computer Society (2005)"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Dalvi, N., Domingos, P., Sanghai, S., Verma, D., et al.: Adversarial classification. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 99\u2013108. ACM (2004)","DOI":"10.1145\/1014052.1014066"},{"key":"18_CR5","unstructured":"Donahue, J., et al.: DeCAF: a deep convolutional activation feature for generic visual recognition. In: Proceedings of the 31st International Conference on Machine Learning, Bejing, China, 22\u201324 June, pp. 647\u2013655 (2014)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Eykholt, K., et al.: Robust physical-world attacks on deep learning visual classification. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2018)","DOI":"10.1109\/CVPR.2018.00175"},{"key":"18_CR7","unstructured":"Gu, T., Dolan-Gavitt, B., Garg, S.: BadNets: identifying vulnerabilities in the machine learning model supply chain. In: Proceedings of the Machine Learning and Computer Security Workshop, Long Beach, CA, USA, 8 December 2017 (2017). http:\/\/arxiv.org\/abs\/1708.06733"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Lowd, D., Meek, C.: Adversarial learning. In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 641\u2013647. ACM (2005)","DOI":"10.1145\/1081870.1081950"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/11856214_5","volume-title":"Recent Advances in Intrusion Detection","author":"J Newsome","year":"2006","unstructured":"Newsome, J., Karp, B., Song, D.: Paragraph: thwarting signature learning by training maliciously. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 81\u2013105. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11856214_5"},{"issue":"1","key":"18_CR10","first-page":"69","volume":"200","author":"N Paparoditis","year":"2012","unstructured":"Paparoditis, N., et al.: Stereopolis ii: a multi-purpose and multi-sensor 3D mobile mapping system for street visualisation and 3D metrology. Revue Fran\u00e7aise Photogramm. T\u00e9l\u00e9d\u00e9tection 200(1), 69\u201379 (2012)","journal-title":"Revue Fran\u00e7aise Photogramm. T\u00e9l\u00e9d\u00e9tection"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z.B., Swami, A.: Practical black-box attacks against machine learning. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 506\u2013519. ACM (2017)","DOI":"10.1145\/3052973.3053009"},{"key":"18_CR12","unstructured":"Pratt, L.Y.: Discriminability-based transfer between neural networks. In: Advances in Neural Information Processing Systems (NIPS), pp. 204\u2013211 (1993)"},{"key":"18_CR13","doi-asserted-by":"publisher","unstructured":"Razavian, A.S., Azizpour, H., Sullivan, J., Carlsson, S.: CNN features off-the-shelf: an astounding baseline for recognition. In: IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 512\u2013519, June 2014. https:\/\/doi.org\/10.1109\/CVPRW.2014.131, http:\/\/arxiv.org\/abs\/1403.6382","DOI":"10.1109\/CVPRW.2014.131"},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"78136","DOI":"10.1109\/ACCESS.2018.2884826","volume":"6","author":"CG Serna","year":"2018","unstructured":"Serna, C.G., Ruichek, Y.: Classification of traffic signs: the European dataset. IEEE Access 6, 78136\u201378148 (2018)","journal-title":"IEEE Access"},{"key":"18_CR15","unstructured":"Shen, S., Tople, S., Saxena, P.: A uror: defending against poisoning attacks in collaborative deep learning systems. In: Proceedings of the 32nd Annual Conference on Computer Security Applications, pp. 508\u2013519. ACM (2016)"},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.neunet.2012.02.016","volume":"32","author":"J. Stallkamp","year":"2012","unstructured":"Stallkamp, J., Schlipsing, M., Salmen, J., Igel, C.: Man vs. computer: benchmarking machine learning algorithms for traffic sign recognition. Neural Netw. 32, 323\u2013332 (2012)","journal-title":"Neural Networks"},{"key":"18_CR17","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: International Conference on Learning Representations. Banff, Canada, 14\u201316 April 2014 (2014) http:\/\/arxiv.org\/abs\/1312.6199"},{"issue":"3","key":"18_CR18","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1007\/s00138-011-0391-3","volume":"25","author":"R Timofte","year":"2014","unstructured":"Timofte, R., Zimmermann, K., Van Gool, L.: Multi-view traffic sign detection, recognition, and 3D localisation. Mach. Vis. Appl. 25(3), 633\u2013647 (2014). https:\/\/doi.org\/10.1007\/s00138-011-0391-3","journal-title":"Mach. Vis. Appl."}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Extraction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29726-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T10:40:25Z","timestamp":1710326425000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-29726-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030297251","9783030297268"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29726-8_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"23 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CD-MAKE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Cross-Domain Conference for Machine Learning and Knowledge Extraction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canterbury","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cd-make2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cd-make.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}