{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:55:10Z","timestamp":1743000910386,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030786083"},{"type":"electronic","value":"9783030786090"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-78609-0_42","type":"book-chapter","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T23:38:40Z","timestamp":1625787520000},"page":"494-504","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adversarial Defense Networks via\u00a0Gaussian Noise and RBF"],"prefix":"10.1007","author":[{"given":"Jingjie","family":"Li","sequence":"first","affiliation":[]},{"given":"Jiaquan","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Guixia","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,9]]},"reference":[{"key":"42_CR1","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceeding of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778. IEEE, Las Vegas (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Zoph, B., Vasudevan, V., Shlens J., Le, Q.V.: Learning transferable architectures for scalable image recognition. In: Proceeding of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 8697\u20138710. IEEE, Salt Lake City (2018)","DOI":"10.1109\/CVPR.2018.00907"},{"issue":"1","key":"42_CR3","doi-asserted-by":"publisher","first-page":"19","DOI":"10.32604\/jbd.2020.01003","volume":"2","author":"YQ Cao","year":"2020","unstructured":"Cao, Y.Q., Tan, C., Ji, G.L.: A multi-label classification method for vehicle video. J. Big Data 2(1), 19\u201331 (2020)","journal-title":"J. Big Data"},{"issue":"6","key":"42_CR4","first-page":"1137","volume":"39","author":"S Ren","year":"2017","unstructured":"Ren, S., He, K., Girshick, R.B., Sun, J.: Faster R-CNN: towards real-time object detection with region proposal networks. Adv. Neural. Inf. Process. Syst. 39(6), 1137\u20131149 (2017)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"He, K., Gkioxari, G., Doll\u00e1r, P., Girshick, R.B.: Mask R-CNN. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 2980\u20132988. IEEE, Venice (2017)","DOI":"10.1109\/ICCV.2017.322"},{"issue":"4","key":"42_CR6","doi-asserted-by":"publisher","first-page":"693","DOI":"10.32604\/iasc.2020.010103","volume":"26","author":"A Qayyum","year":"2020","unstructured":"Qayyum, A., Ahmad, I., Iftikhar, M., Mazher, M.: Object detection and fuzzy-based classification using UAV data. Intell. Autom. Soft Co. 26(4), 693\u2013702 (2020)","journal-title":"Intell. Autom. Soft Co."},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Bahdanau, D., Chorowski, J., Serdyuk, D., Brakel, P., Bengio, Y.: End-to-end attention-based large vocabulary speech recognition. In: IEEE International Conference on Acoustics, pp. 4945\u20134949. IEEE, Shanghai (2016)","DOI":"10.1109\/ICASSP.2016.7472618"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Chiu, C.C., et al.: State-of-the-art speech recognition with sequence-to-sequence models. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4774\u20134778. IEEE, Calgary (2018)","DOI":"10.1109\/ICASSP.2018.8462105"},{"issue":"1","key":"42_CR9","first-page":"149","volume":"26","author":"J Park","year":"2020","unstructured":"Park, J., Kim, S.: Noise cancellation based on voice activity detection using spectral variation for speech recognition in smart home devices. Intell. Autom. Soft Co. 26(1), 149\u2013159 (2020)","journal-title":"Intell. Autom. Soft Co."},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"Nguyen, A.M., Yosinski, J., Clune, J.: Deep neural networks are easily fooled: high confidence predictions for unrecognizable images. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 427\u2013436. IEEE Computer Society, Boston (2015)","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"42_CR11","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: 3rd International Conference on Learning Representations (ICLR). San Diego, CA, USA (2015) arXiv:1412.6572. Accessed 20 Mar 2015"},{"key":"42_CR12","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: 2nd International Conference on Learning Representations (ICLR). Banff, AB, Canada (2014). arXiv:1312.6199. Accessed 19 Feb 2014"},{"key":"42_CR13","doi-asserted-by":"crossref","unstructured":"Xu, W., Evans, D., Qi, Y.: Feature squeezing: detecting adversarial examples in deep neural networks. In: 25th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society, San Diego, California, USA (2017). arXiv:1704.01155. Accessed 5 Dec 2017","DOI":"10.14722\/ndss.2018.23198"},{"key":"42_CR14","doi-asserted-by":"crossref","unstructured":"Meng, D., Chen, H.: MagNet: a two-pronged defense against adversarial examples. In: Proceeding of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 135\u2013147. ACM, New York (2017)","DOI":"10.1145\/3133956.3134057"},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Folz, J., Palacio, S., Hees, J., Dengel, A.: Adversarial defense based on structure-to-signal autoencoders. In: 2020 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 3568\u20133577. IEEE, Snowmass Village (2020)","DOI":"10.1109\/WACV45572.2020.9093310"},{"key":"42_CR16","unstructured":"Wong, E., Kolter, J.Z.: Provable Defenses against Adversarial Examples via the Convex Outer Adversarial Polytope. In: International Conference on Machine Learning (ICML), pp. 5283\u20135292. PMLR, Stockholmsm\u00e4ssan, Stockholm, Sweden (2018)"},{"key":"42_CR17","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P.D., Wu, X., Jha, S., Swami, A.: Distillation as a defense to adversarial perturbations against deep neural networks. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 582\u2013597. IEEE Computer Society, San Jose (2018)","DOI":"10.1109\/SP.2016.41"},{"key":"42_CR18","unstructured":"Buckman, J., Roy, A., Raffel, C., Goodfellow, I.J.: Thermometer encoding: one hot way to resist adversarial examples. In: 6th International Conference on Learning Representations (ICLR). OpenReview.net, Vancouver (2018). https:\/\/openreview.net\/forum?id=rJUYGxbCW. Accessed 16 Feb 2018"},{"issue":"1","key":"42_CR19","doi-asserted-by":"publisher","first-page":"47","DOI":"10.32604\/jihpp.2020.010462","volume":"2","author":"J Zhang","year":"2020","unstructured":"Zhang, J., Wang, J.: A survey on adversarial example. J. Inf. Hiding Privacy Protect. 2(1), 47\u201357 (2020)","journal-title":"J. Inf. Hiding Privacy Protect."},{"issue":"2","key":"42_CR20","doi-asserted-by":"publisher","first-page":"71","DOI":"10.32604\/jbd.2020.012294","volume":"2","author":"H Chen","year":"2020","unstructured":"Chen, H., Zhu, H.Q., Yan, L.M., Wang, J.W.: A survey on adversarial examples in deep learning. J. Big Data 2(2), 71\u201384 (2020)","journal-title":"J. Big Data"},{"key":"42_CR21","unstructured":"Gu, S., Rigazio, L.: Towards deep neural network architectures robust to adversarial examples. In: 3rd International Conference on Learning Representations (ICLR). San Diego, CA, USA (2015). arXiv:1412.5068. Accessed 9 Apr 2015"},{"issue":"1","key":"42_CR22","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/TAC.2006.886541","volume":"52","author":"JX Peng","year":"2007","unstructured":"Peng, J.X., Li, K., Irwin, G.W.: A novel continuous forward algorithm for RBF neural modelling. IEEE T. Automat. Contr. 52(1), 117\u2013122 (2007)","journal-title":"IEEE T. Automat. Contr."},{"issue":"2","key":"42_CR23","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1162\/neco.1989.1.2.281","volume":"1","author":"JE Moody","year":"1989","unstructured":"Moody, J.E., Darken, C.J.: Fast learning in networks of locally-tuned processing units. Neural Comput. 1(2), 281\u2013294 (1989)","journal-title":"Neural Comput."},{"issue":"3","key":"42_CR24","first-page":"321","volume":"2","author":"DS Broomhead","year":"1988","unstructured":"Broomhead, D.S., Lowe, D.: Multivariable functional interpolation and adaptive networks. Complex Syst. 2(3), 321\u2013355 (1988)","journal-title":"Complex Syst."},{"key":"42_CR25","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-319-91253-0_25","volume-title":"Artificial Intelligence and Soft Computing","author":"P Vidnerov\u00e1","year":"2018","unstructured":"Vidnerov\u00e1, P., Neruda, R.: Deep networks with RBF layers to prevent adversarial examples. In: Rutkowski, L., Scherer, R., Korytkowski, M., Pedrycz, W., Tadeusiewicz, R., Zurada, J.M. (eds.) ICAISC 2018. LNCS (LNAI), vol. 10841, pp. 257\u2013266. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91253-0_25"},{"issue":"11","key":"42_CR26","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. P. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"P. IEEE"},{"key":"42_CR27","unstructured":"Han, X., Kashif, R., Roland, V.: Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms. arXiv:1708.07747. Accessed 15 Sept 2017"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78609-0_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T12:07:24Z","timestamp":1672747644000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78609-0_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030786083","9783030786090"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78609-0_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"9 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dublin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ireland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}