{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:47:01Z","timestamp":1772909221731,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319912523","type":"print"},{"value":"9783319912530","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91253-0_25","type":"book-chapter","created":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T14:55:13Z","timestamp":1525964113000},"page":"257-266","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Deep Networks with RBF Layers to Prevent Adversarial Examples"],"prefix":"10.1007","author":[{"given":"Petra","family":"Vidnerov\u00e1","sequence":"first","affiliation":[]},{"given":"Roman","family":"Neruda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,11]]},"reference":[{"key":"25_CR1","volume-title":"Deep Learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press, Cambridge (2016)"},{"issue":"1","key":"25_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2200000006","volume":"2","author":"Y Bengio","year":"2009","unstructured":"Bengio, Y.: Learning deep architectures for AI. Found. Trends Mach. Learn. 2(1), 1\u2013127 (2009)","journal-title":"Found. Trends Mach. Learn."},{"key":"25_CR3","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1016\/j.tics.2007.09.004","volume":"11","author":"GE Hinton","year":"2007","unstructured":"Hinton, G.E.: Learning multiple layers of representation. Trends Cognit. Sci. 11, 428\u2013434 (2007)","journal-title":"Trends Cognit. Sci."},{"key":"25_CR4","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Bartlett, P., Pereira, F., Burges, C., Bottou, L., Weinberger, K. (eds.) Advances in Neural Information Processing Systems, vol. 25, pp. 1106\u20131114. Neural Information Processing Systems Foundation (2012)"},{"key":"25_CR5","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., Fergus, R.: Intriguing properties of neural networks (2013). arXiv:1312.6199"},{"key":"25_CR6","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples (2014). arXiv:1412.6572"},{"key":"25_CR7","unstructured":"LeCun, Y., Cortes, C.: The MNIST database of handwritten digits (2012)"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Nguyen, A.M., Yosinski, J., Clune, J.: Deep neural networks are easily fooled: high confidence predictions for unrecognizable images. CoRR abs\/1412.1897 (2014)","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P.D., Jha, S., Fredrikson, M., Celik, Z.B., Swami, A.: The limitations of deep learning in adversarial settings. CoRR abs\/1511.07528 (2015)","DOI":"10.1109\/EuroSP.2016.36"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P.D., Goodfellow, I.J., Jha, S., Celik, Z.B., Swami, A.: Practical black-box attacks against deep learning systems using adversarial examples. CoRR abs\/1602.02697 (2016)","DOI":"10.1145\/3052973.3053009"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Vidnerov\u00e1, P., Neruda, R.: Evolutionary generation of adversarial examples for deep and shallow machine learning models, pp. 43:1\u201343:7 (2016)","DOI":"10.1145\/2955129.2955178"},{"key":"25_CR12","unstructured":"Gu, S., Rigazio, L.: Towards deep neural network architectures robust to adversarial examples. CoRR abs\/1412.5068 (2014)"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P.D., Wu, X., Jha, S., Swami, A.: Distillation as a defense to adversarial perturbations against deep neural networks. CoRR abs\/1511.04508 (2015)","DOI":"10.1109\/SP.2016.41"},{"key":"25_CR14","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1162\/neco.1989.1.2.281","volume":"1","author":"J Moody","year":"1989","unstructured":"Moody, J., Darken, C.: Fast learning in networks of locally-tuned processing units. Neural Comput. 1, 289\u2013303 (1989)","journal-title":"Neural Comput."},{"key":"25_CR15","unstructured":"Poggio, T., Girosi, F.: A theory of networks for approximation and learning. Technical report, Cambridge, MA, USA (1989) A. I. Memo No. 1140, C.B.I.P. Paper No. 31"},{"key":"25_CR16","first-page":"321","volume":"2","author":"D Broomhead","year":"1988","unstructured":"Broomhead, D., Lowe, D.: Multivariable functional interpolation and adaptive networks. Complex Syst. 2, 321\u2013355 (1988)","journal-title":"Complex Syst."},{"issue":"1","key":"25_CR17","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/TAC.2006.886541","volume":"52","author":"JX Peng","year":"2007","unstructured":"Peng, J.X., Li, K., Irwin, G.W.: A novel continuous forward algorithm for RBF neural modelling. IEEE Trans. Autom. Control 52(1), 117\u2013122 (2007)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"3","key":"25_CR18","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1109\/TSMCB.2003.810911","volume":"33","author":"X Fu","year":"2003","unstructured":"Fu, X., Wang, L.: Data dimensionality reduction with application to simplifying RBF network structure and improving classification performance. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 33(3), 399\u2013409 (2003)","journal-title":"IEEE Trans. Syst. Man Cybern. Part B (Cybern.)"},{"key":"25_CR19","unstructured":"Powel, M.: Radial basis functions for multivariable interpolation: a review. In: IMA Conference on Algorithms for the Approximation of Functions and Data, RMCS, Shrivenham, England, pp. 143\u2013167 (1985)"},{"key":"25_CR20","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-94-011-2634-2_8","volume-title":"Approximation Theory, Spline Functions and Applications","author":"W. A. Light","year":"1992","unstructured":"Light, W.: Some aspects of radial basis function approximation. In: Approximation Theory, Spline Functions and Applications, pp. 163\u2013190. Kluwer Academic Publishers, Dordrecht (1992)"},{"key":"25_CR21","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.1016\/j.future.2004.03.013","volume":"21","author":"R Neruda","year":"2005","unstructured":"Neruda, R., Kudov\u00e1, P.: Learning methods for radial basis functions networks. Future Gener. Comput. Syst. 21, 1131\u20131142 (2005)","journal-title":"Future Gener. Comput. Syst."},{"issue":"6","key":"25_CR22","first-page":"573","volume":"12","author":"R Neruda","year":"2002","unstructured":"Neruda, R., Kudov\u00e1, P.: Hybrid learning of RBF networks. Neural Netw. World 12(6), 573\u2013585 (2002)","journal-title":"Neural Netw. World"},{"key":"25_CR23","unstructured":"Papernot, N., et al.: cleverhans v2.0.0: an adversarial machine learning library. arXiv preprint arXiv:1610.00768 (2017)"},{"key":"25_CR24","unstructured":"Chollet, F.: Keras (2015). https:\/\/github.com\/fchollet\/keras"},{"key":"25_CR25","unstructured":"Vidnerov\u00e1, P.: RBF for keras (2017). https:\/\/github.com\/PetraVidnerova\/rbf_keras"},{"key":"25_CR26","unstructured":"Vidnerov\u00e1, P.: Experiments with deep RBF networks (2017). https:\/\/github.com\/PetraVidnerova\/rbf_tests"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91253-0_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T12:29:55Z","timestamp":1751632195000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-91253-0_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319912523","9783319912530"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91253-0_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"11 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Soft Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zakopane","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icaisc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icaisc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}