{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:24:37Z","timestamp":1763018677424,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031452482"},{"type":"electronic","value":"9783031452499"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45249-9_29","type":"book-chapter","created":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T09:40:34Z","timestamp":1696844434000},"page":"301-312","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Gradient-Based Enhancement Attacks in\u00a0Biomedical Machine Learning"],"prefix":"10.1007","author":[{"given":"Matthew","family":"Rosenblatt","sequence":"first","affiliation":[]},{"given":"Javid","family":"Dadashkarimi","sequence":"additional","affiliation":[]},{"given":"Dustin","family":"Scheinost","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,9]]},"reference":[{"issue":"7511","key":"29_CR1","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1136\/bmj.331.7511.267","volume":"331","author":"S Al-Marzouki","year":"2005","unstructured":"Al-Marzouki, S., Evans, S., Marshall, T., Roberts, I.: Are these data real? Statistical methods for the detection of data fabrication in clinical trials. BMJ 331(7511), 267\u2013270 (2005)","journal-title":"BMJ"},{"key":"29_CR2","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-642-40994-3_25","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"B Biggio","year":"2013","unstructured":"Biggio, B., et al.: Evasion attacks against machine learning at test time. In: Blockeel, H., Kersting, K., Nijssen, S., \u017delezn\u00fd, F. (eds.) ECML PKDD 2013. LNCS (LNAI), vol. 8190, pp. 387\u2013402. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40994-3_25"},{"key":"29_CR3","unstructured":"Biggio, B., Nelson, B., Laskov, P.: Poisoning attacks against support vector machines (Jun 2012)"},{"key":"29_CR4","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","volume":"84","author":"B Biggio","year":"2018","unstructured":"Biggio, B., Roli, F.: Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recognit. 84, 317\u2013331 (2018)","journal-title":"Pattern Recognit."},{"issue":"3","key":"29_CR5","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1128\/mBio.00809-16","volume":"7","author":"EM Bik","year":"2016","unstructured":"Bik, E.M., Casadevall, A., Fang, F.C.: The prevalence of inappropriate image duplication in biomedical research publications. MBio 7(3), 10\u20131128 (2016)","journal-title":"MBio"},{"key":"29_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2021.102141","volume":"73","author":"G Bortsova","year":"2021","unstructured":"Bortsova, G., et al.: Adversarial attack vulnerability of medical image analysis systems: unexplored factors. Med. Image Anal. 73, 102141 (2021)","journal-title":"Med. Image Anal."},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Cin\u00e0, A.E., et al.: Wild patterns reloaded: a survey of machine learning security against training data poisoning (May 2022)","DOI":"10.1145\/3585385"},{"key":"29_CR8","unstructured":"Demontis, A., et al.: Why do adversarial attacks transfer? Explaining transferability of evasion and poisoning attacks. In: USENIX Security Symposium 2019, pp. 321\u2013338 (2019)"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Feng, Y., Ma, B., Zhang, J., Zhao, S., Xia, Y., Tao, D.: FIBA: frequency-Injection based backdoor attack in medical image analysis. arXiv preprint arXiv:2112.01148 (2021)","DOI":"10.1109\/CVPR52688.2022.02021"},{"issue":"6433","key":"29_CR10","doi-asserted-by":"publisher","first-page":"1287","DOI":"10.1126\/science.aaw4399","volume":"363","author":"SG Finlayson","year":"2019","unstructured":"Finlayson, S.G., Bowers, J.D., Ito, J., Zittrain, J.L., Beam, A.L., Kohane, I.S.: Adversarial attacks on medical machine learning. Science 363(6433), 1287\u20131289 (2019)","journal-title":"Science"},{"key":"29_CR11","unstructured":"Finlayson, S.G., Chung, H.W., Kohane, I.S., Beam, A.L.: Adversarial attacks against medical deep learning systems. arXiv preprint arXiv:1804.05296 (2018)"},{"key":"29_CR12","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples (Dec 2014)"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Halchenko, Y., et al.: DataLad: distributed system for joint management of code, data, and their relationship. J. Open Source Softw. 6(63), 3262 (2021)","DOI":"10.21105\/joss.03262"},{"issue":"03","key":"29_CR14","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MCSE.2007.55","volume":"9","author":"JD Hunter","year":"2007","unstructured":"Hunter, J.D.: Matplotlib: a 2D graphics environment. Comput. Sci. Eng. 9(03), 90\u201395 (2007)","journal-title":"Comput. Sci. Eng."},{"key":"29_CR15","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1016\/j.neuroimage.2016.09.046","volume":"146","author":"J Kawahara","year":"2017","unstructured":"Kawahara, J., et al.: BrainNetCNN: convolutional neural networks for brain networks; towards predicting neurodevelopment. Neuroimage 146, 1038\u20131049 (2017)","journal-title":"Neuroimage"},{"key":"29_CR16","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"29_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107332","volume":"110","author":"X Ma","year":"2021","unstructured":"Ma, X., et al.: Understanding adversarial attacks on deep learning based medical image analysis systems. Pattern Recognit. 110, 107332 (2021)","journal-title":"Pattern Recognit."},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Matsuo, Y., Takemoto, K.: Backdoor attacks to deep neural Network-Based system for COVID-19 detection from chest x-ray images. NATO Adv. Sci. Inst. Ser. E Appl. Sci. 11(20), 9556 (2021)","DOI":"10.3390\/app11209556"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Mu\u00f1oz-Gonz\u00e1lez, et al.: Towards poisoning of deep learning algorithms with back-gradient optimization. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp. 27\u201338 (Nov 2017)","DOI":"10.1145\/3128572.3140451"},{"key":"29_CR20","unstructured":"Nwadike, M., Miyawaki, T., Sarkar, E., Maniatakos, M., Shamout, F.: Explainability matters: backdoor attacks on medical imaging. arXiv preprint arXiv:2101.00008 (2020)"},{"key":"29_CR21","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"issue":"6604","key":"29_CR22","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1126\/science.add9993","volume":"377","author":"C Piller","year":"2022","unstructured":"Piller, C.: Blots on a field? Science (New York, NY) 377(6604), 358\u2013363 (2022)","journal-title":"Science (New York, NY)"},{"key":"29_CR23","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2016.110","volume":"3","author":"RA Poldrack","year":"2016","unstructured":"Poldrack, R.A., et al.: A phenome-wide examination of neural and cognitive function. Sci. Data 3, 160110 (2016)","journal-title":"Sci. Data"},{"issue":"3","key":"29_CR24","first-page":"346","volume":"6","author":"K Ren","year":"2020","unstructured":"Ren, K., Zheng, T., Qin, Z., Liu, X.: Adversarial attacks and defenses in deep learning. Proc. Est. Acad. Sci. Eng. 6(3), 346\u2013360 (2020)","journal-title":"Proc. Est. Acad. Sci. Eng."},{"issue":"7","key":"29_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2023.100756","volume":"4","author":"M Rosenblatt","year":"2023","unstructured":"Rosenblatt, M., et al.: Connectome-based machine learning models are vulnerable to subtle data manipulations. Patterns 4(7), 100756 (2023)","journal-title":"Patterns"},{"key":"29_CR26","doi-asserted-by":"publisher","unstructured":"Rosenblatt, M., Scheinost, D.: Data poisoning attack and defenses in Connectome-Based predictive models. In: Workshop on the Ethical and Philosophical Issues in Medical Imaging,Multimodal Learning and Fusion Across Scales for Clinical Decision Support, and Topological Data Analysis for Biomedical Imaging. EPIMI ML-CDS TDA4BiomedicalImaging 2022 2022 2022. Lecture Notes in Computer Science, vol.13755, pp. 3\u201313. Springer Nature Switzerland (2022). https:\/\/doi.org\/10.1007\/978-3-031-23223-7_1","DOI":"10.1007\/978-3-031-23223-7_1"},{"issue":"Pt B","key":"29_CR27","doi-asserted-by":"publisher","first-page":"1115","DOI":"10.1016\/j.neuroimage.2015.03.056","volume":"124","author":"TD Satterthwaite","year":"2016","unstructured":"Satterthwaite, T.D., et al.: The Philadelphia neurodevelopmental cohort: a publicly available resource for the study of normal and abnormal brain development in youth. Neuroimage 124(Pt B), 1115\u20131119 (2016)","journal-title":"Neuroimage"},{"key":"29_CR28","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.neuroimage.2013.07.064","volume":"86","author":"TD Satterthwaite","year":"2014","unstructured":"Satterthwaite, T.D., et al.: Neuroimaging of the Philadelphia neurodevelopmental cohort. Neuroimage 86, 544\u2013553 (2014)","journal-title":"Neuroimage"},{"key":"29_CR29","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.neuroimage.2013.05.081","volume":"82","author":"X Shen","year":"2013","unstructured":"Shen, X., Tokoglu, F., Papademetris, X., Constable, R.T.: Groupwise whole-brain parcellation from resting-state fMRI data for network node identification. Neuroimage 82, 403\u2013415 (2013)","journal-title":"Neuroimage"},{"key":"29_CR30","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks (Dec 2013)"},{"issue":"60","key":"29_CR31","doi-asserted-by":"publisher","first-page":"3021","DOI":"10.21105\/joss.03021","volume":"6","author":"M Waskom","year":"2021","unstructured":"Waskom, M.: seaborn: statistical data visualization. J. Open Source Softw. 6(60), 3021 (2021)","journal-title":"J. Open Source Softw."},{"key":"29_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-030-87199-4_4","volume-title":"Medical Image Computing and Computer Assisted Intervention \u2013 MICCAI 2021","author":"Q Yao","year":"2021","unstructured":"Yao, Q., He, Z., Lin, Y., Ma, K., Zheng, Y., Zhou, S.K.: A hierarchical feature constraint to\u00a0camouflage medical adversarial attacks. In: de Bruijne, M., et al. (eds.) MICCAI 2021. LNCS, vol. 12903, pp. 36\u201347. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-87199-4_4"}],"container-title":["Lecture Notes in Computer Science","Clinical Image-Based Procedures, Fairness of AI in Medical Imaging, and Ethical and Philosophical Issues in Medical Imaging"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45249-9_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T15:00:17Z","timestamp":1710255617000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45249-9_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031452482","9783031452499"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45249-9_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"9 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EPIMI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Workshop on the Ethical and Philosophical Issues in Medical Imaging","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"epimi2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/view\/epimi\/home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}