{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:57:34Z","timestamp":1743155854531,"version":"3.40.3"},"publisher-location":"Cham","reference-count":57,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031150296"},{"type":"electronic","value":"9783031150302"}],"license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-15030-2_13","type":"book-chapter","created":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T10:04:03Z","timestamp":1670407443000},"page":"291-301","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Model Fooling Threats Against Medical Imaging"],"prefix":"10.1007","author":[{"given":"Tuomo","family":"Sipola","sequence":"first","affiliation":[]},{"given":"Tero","family":"Kokkonen","sequence":"additional","affiliation":[]},{"given":"Mika","family":"Karjalainen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,1]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Afifi, M., Brown, M.S.: What else can fool deep learning? Addressing color constancy errors on deep neural network performance. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 243\u2013252 (2019)","DOI":"10.1109\/ICCV.2019.00033"},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar, N., Mian, A.: Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 6, 14410\u201314430 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2807385","journal-title":"IEEE Access"},{"key":"13_CR3","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/870\/1\/012043","volume":"870","author":"ZT Al-Sharify","year":"2020","unstructured":"Al-Sharify, Z.T., Al-Sharify, T.A., Al-Sharify, N.T., Naser, H.Y.: A critical review on medical imaging techniques (CT and PET scans) in the medical field. IOP Conf. Ser. Mater. Sci. Eng. 870, 012043 (2020). https:\/\/doi.org\/10.1088\/1757-899x\/870\/1\/012043","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"issue":"17","key":"13_CR4","doi-asserted-by":"publisher","first-page":"2132","DOI":"10.3390\/electronics10172132","volume":"10","author":"KD Apostolidis","year":"2021","unstructured":"Apostolidis, K.D., Papakostas, G.A.: A survey on adversarial deep learning robustness in medical image analysis. Electronics 10(17), 2132 (2021). https:\/\/doi.org\/10.3390\/electronics10172132","journal-title":"Electronics"},{"key":"13_CR5","doi-asserted-by":"publisher","unstructured":"Armanious, K., Mecky, Y., Gatidis, S., Yang, B.: Adversarial inpainting of medical image modalities. In: ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3267\u20133271 (2019). https:\/\/doi.org\/10.1109\/ICASSP.2019.8682677","DOI":"10.1109\/ICASSP.2019.8682677"},{"key":"13_CR6","unstructured":"Athalye, A., Engstrom, L., Ilyas, A., Kwok, K.: Synthesizing robust adversarial examples. In: Proceedings of the 35th International Conference on Machine Learning, vol. 80, pp. 284\u2013293. PMLR, Stockholm (2018)"},{"key":"13_CR7","unstructured":"Brown, T.B., Man\u00e9, D., Roy, A., Abadi, M., Gilmer, J.: Adversarial patch. arXiv preprint arXiv:1712.09665v2 (2018)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 39\u201357 (2017). https:\/\/doi.org\/10.1109\/SP.2017.49","DOI":"10.1109\/SP.2017.49"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.breast.2019.10.001","volume":"49","author":"SM Carter","year":"2020","unstructured":"Carter, S.M., Rogers, W., Win, K.T., Frazer, H., Richards, B., Houssami, N.: The ethical, legal and social implications of using artificial intelligence systems in breast cancer care. Breast 49, 25\u201332 (2020). https:\/\/doi.org\/10.1016\/j.breast.2019.10.001","journal-title":"Breast"},{"key":"13_CR10","doi-asserted-by":"publisher","unstructured":"Chuquicusma, M.J.M., Hussein, S., Burt, J., Bagci, U.: How to fool radiologists with generative adversarial networks? A visual turing test for lung cancer diagnosis. In: 2018 IEEE 15th International Symposium on Biomedical Imaging (ISBI 2018), pp. 240\u2013244 (2018). https:\/\/doi.org\/10.1109\/ISBI.2018.8363564","DOI":"10.1109\/ISBI.2018.8363564"},{"key":"13_CR11","doi-asserted-by":"publisher","unstructured":"Cristovao, F., Cascianelli, S., Canakoglu, A., Carman, M., Nanni, L., Pinoli, P., Masseroli, M.: Investigating deep learning based breast cancer subtyping using pan-cancer and multi-omic data. IEEE\/ACM Trans. Comput. Biol. Bioinform. 1\u20131 (2020). https:\/\/doi.org\/10.1109\/TCBB.2020.3042309","DOI":"10.1109\/TCBB.2020.3042309"},{"key":"13_CR12","doi-asserted-by":"publisher","unstructured":"Deng, Y., Zhang, C., Wang, X.: A multi-objective examples generation approach to fool the deep neural networks in the black-box scenario. In: 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC), pp. 92\u201399 (2019). https:\/\/doi.org\/10.1109\/DSC.2019.00022","DOI":"10.1109\/DSC.2019.00022"},{"issue":"4\u20135","key":"13_CR13","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.compmedimag.2007.02.002","volume":"31","author":"K Doi","year":"2007","unstructured":"Doi, K.: Computer-aided diagnosis in medical imaging: historical review, current status and future potential. Comput. Med. Imaging Graph. 31(4\u20135), 198\u2013211 (2007)","journal-title":"Comput. Med. Imaging Graph."},{"issue":"6433","key":"13_CR14","doi-asserted-by":"publisher","first-page":"1287","DOI":"10.1126\/science.aaw4399","volume":"363","author":"SG Finlayson","year":"2019","unstructured":"Finlayson, S.G., Bowers, J.D., Ito, J., Zittrain, J.L., Beam, A.L., Kohane, I.S.: Adversarial attacks on medical machine learning. Science 363(6433), 1287\u20131289 (2019)","journal-title":"Science"},{"key":"13_CR15","unstructured":"Finlayson, S.G., Chung, H.W., Kohane, I.S., Beam, A.L.: Adversarial attacks against medical deep learning systems. arXiv preprint arXiv:1804.05296v3 (2019)"},{"key":"13_CR16","unstructured":"Gilmer, J., Metz, L., Faghri, F., Schoenholz, S.S., Raghu, M., Wattenberg, M., Goodfellow, I., Brain, G.: The relationship between high-dimensional geometry and adversarial examples. arXiv preprint arXiv:1801.02774 (2018)"},{"key":"13_CR17","volume-title":"Deep Learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press, Cambridge (2016). http:\/\/www.deeplearningbook.org"},{"key":"13_CR18","doi-asserted-by":"publisher","first-page":"47230","DOI":"10.1109\/ACCESS.2019.2909068","volume":"7","author":"T Gu","year":"2019","unstructured":"Gu, T., Liu, K., Dolan-Gavitt, B., Garg, S.: BadNets: Evaluating Backdooring Attacks on Deep Neural Networks. IEEE Access 7, 47230\u201347244 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2909068","journal-title":"IEEE Access"},{"key":"13_CR19","doi-asserted-by":"publisher","unstructured":"Gu, Z., Hu, W., Zhang, C., Lu, H., Yin, L., Wang, L.: Gradient shielding: towards understanding vulnerability of deep neural networks. IEEE Trans. Netw. Sci. Eng. 1\u20131 (2020). https:\/\/doi.org\/10.1109\/TNSE.2020.2996738","DOI":"10.1109\/TNSE.2020.2996738"},{"key":"13_CR20","unstructured":"INTERPOL, The International Criminal Police Organization: INTERPOL report shows alarming rate of cyberattacks during COVID-19 (2020). https:\/\/www.interpol.int\/en\/News-and-Events\/News\/2020\/INTERPOL-report-shows-alarming-rate-of-cyberattacks-during-COVID-19. Accessed 4 Dec 2020"},{"key":"13_CR21","doi-asserted-by":"publisher","first-page":"9375","DOI":"10.1109\/ACCESS.2017.2788044","volume":"6","author":"J Ker","year":"2018","unstructured":"Ker, J., Wang, L., Rao, J., Lim, T.: Deep learning applications in medical image analysis. IEEE Access 6, 9375\u20139389 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2017.2788044","journal-title":"IEEE Access"},{"key":"13_CR22","doi-asserted-by":"publisher","unstructured":"Korpihalkola, J., Sipola, T., Kokkonen, T.: Color-optimized one-pixel attack against digital pathology images. In: Balandin, S., Koucheryavy, Y., Tyutina, T. (eds.) 2021 29th Conference of Open Innovations Association (FRUCT), vol. 29, pp. 206\u2013213. IEEE (2021). https:\/\/doi.org\/10.23919\/FRUCT52173.2021.9435562","DOI":"10.23919\/FRUCT52173.2021.9435562"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Korpihalkola, J., Sipola, T., Puuska, S., Kokkonen, T.: One-pixel attack deceives computer-assisted diagnosis of cancer. In: Proceedings of the 4th International Conference on Signal Processing and Machine Learning (SPML 2021), August 18\u201320, 2021, Beijing, China. ACM, New York (2021). https:\/\/doi.org\/10.1145\/3483207.3483224","DOI":"10.1145\/3483207.3483224"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"K\u00fcgler, D., Distergoft, A., Kuijper, A., Mukhopadhyay, A.: Exploring adversarial examples. In: Stoyanov, D., Taylor, Z., Kia, S.M., Oguz, I., Reyes, M., Martel, A., Maier-Hein, L., Marquand, A.F., Duchesnay, E., L\u00f6fstedt, T., Landman, B., Cardoso, M.J., Silva, C.A., Pereira, S., Meier, R. (eds.) Understanding and Interpreting Machine Learning in Medical Image Computing Applications. Lecture Notes in Computer Science, vol. 11038, pp. 70\u201378. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-02628-8_8","DOI":"10.1007\/978-3-030-02628-8_8"},{"key":"13_CR25","doi-asserted-by":"publisher","unstructured":"Latif, J., Xiao, C., Imran, A., Tu, S.: Medical imaging using machine learning and deep learning algorithms: a review. In: 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), pp. 1\u20135 (2019). https:\/\/doi.org\/10.1109\/ICOMET.2019.8673502","DOI":"10.1109\/ICOMET.2019.8673502"},{"key":"13_CR26","doi-asserted-by":"publisher","first-page":"107332","DOI":"10.1016\/j.patcog.2020.107332","volume":"110","author":"X Ma","year":"2020","unstructured":"Ma, X., Niu, Y., Gu, L., Wang, Y., Zhao, Y., Bailey, J., Lu, F.: Understanding adversarial attacks on deep learning based medical image analysis systems. Pattern Recogn. 110, 107332 (2020). https:\/\/doi.org\/10.1016\/j.patcog.2020.107332","journal-title":"Pattern Recogn."},{"key":"13_CR27","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards Deep Learning Models Resistant to Adversarial Attacks. arXiv preprint arXiv:1706.06083v4 arXiv:1706.06083 (2019)"},{"key":"13_CR28","doi-asserted-by":"publisher","unstructured":"Mihajlovi\u0107, M., Popovi\u0107, N.: Fooling a neural network with common adversarial noise. In: 2018 19th IEEE Mediterranean Electrotechnical Conference (MELECON), pp. 293\u2013296 (2018). https:\/\/doi.org\/10.1109\/MELCON.2018.8379110","DOI":"10.1109\/MELCON.2018.8379110"},{"key":"13_CR29","doi-asserted-by":"publisher","unstructured":"Miko\u0142ajczyk, A., Grochowski, M.: Data augmentation for improving deep learning in image classification problem. In: 2018 International Interdisciplinary Ph.D Workshop (IIPhDW), pp. 117\u2013122 (2018). https:\/\/doi.org\/10.1109\/IIPHDW.2018.8388338","DOI":"10.1109\/IIPHDW.2018.8388338"},{"key":"13_CR30","doi-asserted-by":"publisher","unstructured":"Moosavi-Dezfooli, S., Fawzi, A., Fawzi, O., Frossard, P.: Universal adversarial perturbations. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 86\u201394. IEEE Computer Society, Los Alamitos (2017). https:\/\/doi.org\/10.1109\/CVPR.2017.17","DOI":"10.1109\/CVPR.2017.17"},{"key":"13_CR31","doi-asserted-by":"publisher","unstructured":"Moosavi-Dezfooli, S., Fawzi, A., Frossard, P.: Deepfool: a simple and accurate method to fool deep neural networks. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2574\u20132582 (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.282","DOI":"10.1109\/CVPR.2016.282"},{"key":"13_CR32","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1186\/s12874-018-0611-x","volume":"18","author":"Z Munn","year":"2018","unstructured":"Munn, Z., Peters, M.D.J., Stern, C., Tufanaru, C., McArthur, A., Aromataris, E.: Systematic review or scoping review? guidance for authors when choosing between a systematic or scoping review approach. BMC Med. Res. Methodol. 18, 143 (2018). https:\/\/doi.org\/10.1186\/s12874-018-0611-x","journal-title":"BMC Med. Res. Methodol."},{"key":"13_CR33","doi-asserted-by":"publisher","unstructured":"Murugesan, M., Sukanesh, R.: Automated Detection of Brain Tumor in EEG Signals Using Artificial Neural Networks. In: 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies, pp. 284\u2013288 (2009). https:\/\/doi.org\/10.1109\/ACT.2009.77","DOI":"10.1109\/ACT.2009.77"},{"key":"13_CR34","doi-asserted-by":"publisher","unstructured":"Nguyen, A., Yosinski, J., Clune, J.: Deep neural networks are easily fooled: high confidence predictions for unrecognizable images. In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 427\u2013436 (2015). https:\/\/doi.org\/10.1109\/CVPR.2015.7298640","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"13_CR35","unstructured":"Paschali, M., Conjeti, S., Navarro, F., Navab, N.: Generalizability vs. robustness: adversarial examples for medical imaging. arXiv preprint arXiv:1804.00504 (2018)"},{"key":"13_CR36","doi-asserted-by":"publisher","unstructured":"Paul, R., Schabath, M., Gillies, R., Hall, L., Goldgof, D.: Mitigating adversarial attacks on medical image understanding systems. In: 2020 IEEE 17th International Symposium on Biomedical Imaging (ISBI), pp. 1517\u20131521 (2020). https:\/\/doi.org\/10.1109\/ISBI45749.2020.9098740","DOI":"10.1109\/ISBI45749.2020.9098740"},{"key":"13_CR37","doi-asserted-by":"publisher","unstructured":"Poonguzhali, N., Dharani, V., Nivedha, R., Ruby, L.S.: Prediction of breast cancer using electronic health record. In: 2020 International Conference on System, Computation, Automation and Networking (ICSCAN), pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/ICSCAN49426.2020.9262398","DOI":"10.1109\/ICSCAN49426.2020.9262398"},{"key":"13_CR38","doi-asserted-by":"publisher","unstructured":"Rai, S., Raut, A., Savaliya, A., Shankarmani, R.: Darwin: Convolutional neural network based intelligent health assistant. In: 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), pp. 1367\u20131371 (2018). https:\/\/doi.org\/10.1109\/ICECA.2018.8474861","DOI":"10.1109\/ICECA.2018.8474861"},{"issue":"14","key":"13_CR39","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.1056\/NEJMra1814259","volume":"380","author":"A Rajkomar","year":"2019","unstructured":"Rajkomar, A., Dean, J., Kohane, I.: Machine learning in medicine. N. Engl. J. Med. 380(14), 1347\u20131358 (2019). https:\/\/doi.org\/10.1056\/NEJMra1814259","journal-title":"N. Engl. J. Med."},{"key":"13_CR40","doi-asserted-by":"publisher","unstructured":"Rastgar-Jazi, M., Fernando, X.: Detection of heart abnormalities via artificial neural network: an application of self learning algorithms. In: 2017 IEEE Canada International Humanitarian Technology Conference (IHTC), pp. 66\u201369 (2017). https:\/\/doi.org\/10.1109\/IHTC.2017.8058202","DOI":"10.1109\/IHTC.2017.8058202"},{"key":"13_CR41","doi-asserted-by":"crossref","unstructured":"Ravish, D.K., Shanthi, K.J., Shenoy, N.R., Nisargh, S.: Heart function monitoring, prediction and prevention of heart attacks: using artificial neural networks. In: 2014 International Conference on Contemporary Computing and Informatics (IC3I), pp. 1\u20136 (2014). https:\/\/doi.org\/10.1109\/IC3I.2014.7019580","DOI":"10.1109\/IC3I.2014.7019580"},{"key":"13_CR42","doi-asserted-by":"publisher","unstructured":"Razzaq, S., Mubeen, N., Kiran, U., Asghar, M.A., Fawad, F.: Brain tumor detection from mri images using bag of features and deep neural network. In: 2020 International Symposium on Recent Advances in Electrical Engineering Computer Sciences (RAEE CS), vol. 5, pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/RAEECS50817.2020.9265768","DOI":"10.1109\/RAEECS50817.2020.9265768"},{"key":"13_CR43","doi-asserted-by":"publisher","unstructured":"Ruiz, L., Mart\u00edn, A., Urbanos, G., Villanueva, M., Sancho, J., Rosa, G., Villa, M., Chavarr\u00edas, M., P\u00e9rez, \u00c1., Juarez, E., Lagares, A., Sanz, C.: Multiclass brain tumor classification using hyperspectral imaging and supervised machine learning. In: 2020 XXXV Conference on Design of Circuits and Integrated Systems (DCIS), pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/DCIS51330.2020.9268650","DOI":"10.1109\/DCIS51330.2020.9268650"},{"issue":"13","key":"13_CR44","doi-asserted-by":"publisher","first-page":"3254","DOI":"10.1049\/iet-ipr.2020.0122","volume":"14","author":"WM Salama","year":"2020","unstructured":"Salama, W.M., Elbagoury, A.M., Aly, M.H.: Novel breast cancer classification framework based on deep learning. IET Image Process.14(13), 3254\u20133259 (2020). https:\/\/doi.org\/10.1049\/iet-ipr.2020.0122","journal-title":"IET Image Process."},{"key":"13_CR45","doi-asserted-by":"publisher","unstructured":"Sasubilli, S.M., Kumar, A., Dutt, V.: Machine learning implementation on medical domain to identify disease insights using TMS. In: 2020 International Conference on Advances in Computing and Communication Engineering (ICACCE), pp. 1\u20134 (2020). https:\/\/doi.org\/10.1109\/ICACCE49060.2020.9154960","DOI":"10.1109\/ICACCE49060.2020.9154960"},{"key":"13_CR46","unstructured":"Secretariat of the Security Committee: Finland\u2019s Cyber security Strategy, Government Resolution 3.10.2019 (2019). https:\/\/turvallisuuskomitea.fi\/wp-content\/uploads\/2019\/10\/Kyberturvallisuusstrategia_A4_ENG_WEB_031019.pdf"},{"key":"13_CR47","first-page":"197","volume-title":"Trends and Applications in Information Systems and Technologies. WorldCIST 2021. Advances in Intelligent Systems and Computing","author":"T Sipola","year":"2021","unstructured":"Sipola, T., Kokkonen, T.: One-pixel attacks against medical imaging: a conceptual framework. In: Rocha, \u00c1., Adeli, H., Dzemyda, G., Moreira, F., Ramalho Correia A. (eds.) Trends and Applications in Information Systems and Technologies. WorldCIST 2021. Advances in Intelligent Systems and Computing, vol. 1365, pp. 197\u2013203. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-72657-7_19"},{"issue":"2","key":"13_CR48","doi-asserted-by":"publisher","first-page":"215","DOI":"10.11610\/isij.4615","volume":"46","author":"T Sipola","year":"2020","unstructured":"Sipola, T., Puuska, S., Kokkonen, T.: Model fooling attacks against medical imaging: a short survey. Inf. Secur. Int. J. 46(2), 215\u2013224 (2020). https:\/\/doi.org\/10.11610\/isij.4615","journal-title":"Inf. Secur. Int. J."},{"key":"13_CR49","doi-asserted-by":"publisher","unstructured":"Someswararao, C., Shankar, R.S., Appaji, S.V., Gupta, V.: Brain tumor detection model from mr images using convolutional neural network. In: 2020 International Conference on System, Computation, Automation and Networking (ICSCAN), pp. 1\u20134 (2020). https:\/\/doi.org\/10.1109\/ICSCAN49426.2020.9262373","DOI":"10.1109\/ICSCAN49426.2020.9262373"},{"issue":"1","key":"13_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s41074-019-0053-3","volume":"11","author":"J Su","year":"2019","unstructured":"Su, J., Vargas, D.V., Sakurai, K.: Attacking convolutional neural network using differential evolution. IPSJ Trans. Comput. Vis. Appl. 11(1), 1\u201316 (2019)","journal-title":"IPSJ Trans. Comput. Vis. Appl."},{"issue":"5","key":"13_CR51","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","volume":"23","author":"J Su","year":"2019","unstructured":"Su, J., Vargas, D.V., Sakurai, K.: One pixel attack for fooling deep neural networks. IEEE Trans. Evol. Comput. 23(5), 828\u2013841 (2019). https:\/\/doi.org\/10.1109\/TEVC.2019.2890858","journal-title":"IEEE Trans. Evol. Comput."},{"key":"13_CR52","doi-asserted-by":"publisher","unstructured":"Syam, R., Marapareddy, R.: Application of deep neural networks in the field of information security and healthcare. In: 2019 SoutheastCon, pp. 1\u20135 (2019). https:\/\/doi.org\/10.1109\/SoutheastCon42311.2019.9020553","DOI":"10.1109\/SoutheastCon42311.2019.9020553"},{"key":"13_CR53","doi-asserted-by":"crossref","unstructured":"Taghanaki, S.A., Das, A., Hamarneh, G.: Vulnerability Analysis of Chest X-Ray Image Classification Against Adversarial Attacks. In: Stoyanov, D., Taylor, Z., Kia, S.M., Oguz, I., Reyes, M., Martel, A., Maier-Hein, L., Marquand, A.F., Duchesnay, E., L\u00f6fstedt, T., Landman, B., Cardoso, M.J., Silva, C.A., Pereira, S., Meier, R. (eds.) Understanding and Interpreting Machine Learning in Medical Image Computing Applications, pp. 87\u201394. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-02628-8_10","DOI":"10.1007\/978-3-030-02628-8_10"},{"key":"13_CR54","doi-asserted-by":"crossref","unstructured":"Tizhoosh, H.R., Pantanowitz, L.: Artificial intelligence and digital pathology: challenges and opportunities. J. Pathol. Inform. 9 (2018)","DOI":"10.4103\/jpi.jpi_53_18"},{"key":"13_CR55","unstructured":"Vargas, D.V., Su, J.: Understanding the one-pixel attack: propagation maps and locality analysis. arXiv preprint arXiv:1902.02947 (2019)"},{"issue":"2","key":"13_CR56","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s11633-019-1211-x","volume":"17","author":"H Xu","year":"2020","unstructured":"Xu, H., Ma, Y., Liu, H.C., Deb, D., Liu, H., Tang, J.L., Jain, A.K.: Adversarial attacks and defenses in images, graphs and text: a review. Int. J. Autom. Comput. 17(2), 151\u2013178 (2020). https:\/\/doi.org\/10.1007\/s11633-019-1211-x","journal-title":"Int. J. Autom. Comput."},{"key":"13_CR57","unstructured":"Yang, C., Wu, Q., Li, H., Chen, Y.: Generative poisoning attack method against neural networks. arXiv preprint arXiv:1703.01340 (2017)"}],"container-title":["Artificial Intelligence and Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15030-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T10:12:24Z","timestamp":1670407944000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15030-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,1]]},"ISBN":["9783031150296","9783031150302"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15030-2_13","relation":{},"subject":[],"published":{"date-parts":[[2022,8,1]]},"assertion":[{"value":"1 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}