{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:44:25Z","timestamp":1742913865360,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031097256"},{"type":"electronic","value":"9783031097263"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-09726-3_14","type":"book-chapter","created":{"date-parts":[[2022,6,25]],"date-time":"2022-06-25T17:03:59Z","timestamp":1656176639000},"page":"155-166","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adversarial Examples Are Closely Relevant to\u00a0Neural Network Models - A Preliminary Experiment Explore"],"prefix":"10.1007","author":[{"given":"Zheng","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Ju","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yanyang","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,26]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.A.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 39\u201357 (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"14_CR2","unstructured":"Clevert, D.A., Unterthiner, T., Hochreiter, S.: Fast and accurate deep network learning by exponential linear units (elus). arXiv: Learning (2016)"},{"key":"14_CR3","unstructured":"Contributors, T.: Logsigmoid (2019). https:\/\/pytorch.org\/docs\/stable\/generated\/torch.nn.LogSigmoid.html. Accessed on 23 Mar 2022"},{"key":"14_CR4","unstructured":"Contributors, T.: Softplus (2019). https:\/\/pytorch.org\/docs\/stable\/generated\/torch.nn.Softplus.html. Accessed on 23 Mar 2022"},{"key":"14_CR5","unstructured":"Glorot, X., Bordes, A., Bengio, Y.: Deep sparse rectifier neural networks. In: 2011 Proceedings of the 14th International Conference on Artificial Intelligence and Statisitics (AISTATS), vol. 15, pp. 315\u2013323 (2011)"},{"key":"14_CR6","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: International Conference on Learning Representations (ICLR) abs\/1412.6572 (2015)"},{"key":"14_CR7","doi-asserted-by":"publisher","unstructured":"Huang, G., Liu, Z., Van Der Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2261\u20132269 (2017). https:\/\/doi.org\/10.1109\/CVPR.2017.243","DOI":"10.1109\/CVPR.2017.243"},{"key":"14_CR8","unstructured":"Ilyas, A., Santurkar, S., Tsipras, D., Engstrom, L., Tran, B., Madry, A.: Adversarial examples are not bugs, they are features. In: Advances in Neural Information Processing Systems abs\/1905.02175, pp. 125\u2013136 (2019)"},{"key":"14_CR9","unstructured":"Krizhevsky, A.: Learning multiple layers of features from tiny images. Technical report (2009)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial examples in the physical world. Toulon, France (2017)","DOI":"10.1201\/9781351251389-8"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/TPAMI.2018.2858826","volume":"42","author":"TY Lin","year":"2020","unstructured":"Lin, T.Y., Goyal, P., Girshick, R.B., He, K., Doll\u00e1r, P.: Focal loss for dense object detection. IEEE Trans. Pattern Anal. Mach. Intell. 42, 318\u2013327 (2020)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"3","key":"14_CR12","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.32604\/cmc.2020.07421","volume":"62","author":"C Liu","year":"2020","unstructured":"Liu, C., et al.: Defend against adversarial samples by using perceptual hash. Comput. Mater. Continua 62(3), 1365\u20131386 (2020)","journal-title":"Comput. Mater. Continua"},{"key":"14_CR13","unstructured":"Ma, X., et al.: Characterizing adversarial subspaces using local intrinsic dimensionality. In: International Conference on Learning Representations (2018). https:\/\/openreview.net\/forum?id=B1gJ1L2aW"},{"key":"14_CR14","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. ArXiv abs\/1706.06083 (2018)"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Frossard, P.: Deepfool: a simple and accurate method to fool deep neural networks. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2574\u20132582 (2016)","DOI":"10.1109\/CVPR.2016.282"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Papernot, N., Mcdaniel, P., Jha, S., Fredrikson, M., Celik, Z.B., Swami, A.: The limitations of deep learning in adversarial settings. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 372\u2013387 (2016)","DOI":"10.1109\/EuroSP.2016.36"},{"key":"14_CR17","unstructured":"Qin, Y., Carlini, N., Goodfellow, I.J., Cottrell, G., Raffel, C.: Imperceptible, robust, and targeted adversarial examples for automatic speech recognition, vol. 97, p. 5231\u20135240, California, USA, 09\u201315 June 2019"},{"key":"14_CR18","doi-asserted-by":"publisher","unstructured":"Raff, E., Sylvester, J., Forsyth, S., McLean, M.: Barrage of random transforms for adversarially robust defense. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 6521\u20136530 (2019). https:\/\/doi.org\/10.1109\/CVPR.2019.00669","DOI":"10.1109\/CVPR.2019.00669"},{"key":"14_CR19","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1073\/pnas.6.6.275","volume":"6","author":"R Pearl","year":"1920","unstructured":"Pearl, R., Reed, L.J.: On the rate of growth of the population of the united states since 1790 and its mathematical representation. Proc. Nat. Acad. Sci. 6, 275\u2013288 (1920)","journal-title":"Proc. Nat. Acad. Sci."},{"key":"14_CR20","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27, 379\u2013423 (1948)","journal-title":"Bell Syst. Tech. J."},{"key":"14_CR21","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: International Conference on Learning Representations (ICLR) abs\/1312.6199 (2014)"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Wang, J., Dong, G., Sun, J., Wang, X., Zhang, P.: Adversarial sample detection for deep neural network through model mutation testing. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pp. 1245\u20131256 (2019)","DOI":"10.1109\/ICSE.2019.00126"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Xiao, C., Li, B., Zhu, J.Y., He, W., Liu, M., Song, D.X.: Generating adversarial examples with adversarial networks. ArXiv abs\/1801.02610 (2018)","DOI":"10.24963\/ijcai.2018\/543"},{"issue":"11","key":"14_CR24","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Yakura, H., Sakuma, J.: Robust audio adversarial example for a physical attack. In: International Joint Conference on Artificial Intelligence (IJCAI), vol. abs\/1810.11793, Macao, China (2019)","DOI":"10.24963\/ijcai.2019\/741"},{"key":"14_CR26","unstructured":"Yang, Y., Zhang, G., Katabi, D., Xu, Z.: Me-net: towards effective adversarial robustness with matrix estimation, vol. 97, pp. 7025\u20137034. Long Beach, California, USA (2019)"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Wu, Y., Arora, S.S., Wu, Y., Yang, H.: Beating attackers at their own games: Adversarial example detection using adversarial gradient directions. In: 35th AAAI Conference on Artificial Intelligence\/33rd Conference on Innovative Applications of Artificial Intelligence\/11th Symposium on Educational Advances in Artificial Intelligence, pp. 2969\u20132977 (2021)","DOI":"10.1609\/aaai.v35i4.16404"},{"key":"14_CR28","doi-asserted-by":"publisher","first-page":"1291","DOI":"10.1109\/TIP.2020.3042083","volume":"30","author":"C Zhang","year":"2021","unstructured":"Zhang, C., et al.: Interpreting and improving adversarial robustness of deep neural networks with neuron sensitivity. IEEE Trans. Image Process. 30, 1291\u20131304 (2021). https:\/\/doi.org\/10.1109\/TIP.2020.3042083","journal-title":"IEEE Trans. Image Process."}],"container-title":["Lecture Notes in Computer Science","Advances in Swarm Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-09726-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T13:22:23Z","timestamp":1710249743000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-09726-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031097256","9783031097263"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-09726-3_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"26 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Sensing and Imaging","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsi2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iasei.org\/icsi2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"171","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"85","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}