{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T19:10:10Z","timestamp":1749928210676,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":42,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819681693","type":"print"},{"value":"9789819681709","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-8170-9_5","type":"book-chapter","created":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T18:50:31Z","timestamp":1749927031000},"page":"57-69","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Unified Detector for\u00a0Both Adversarial Attacks and\u00a0Out-of-Distribution Samples Based on\u00a0Kernel Path Distribution"],"prefix":"10.1007","author":[{"given":"Seonggyeom","family":"Kim","sequence":"first","affiliation":[]},{"given":"Minju","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dong-Kyu","family":"Chae","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,15]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Abusnaina, A., et\u00a0al.: Adversarial example detection using latent neighborhood graph. In: ICCV (2021)","DOI":"10.1109\/ICCV48922.2021.00759"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, T.W., Darling, D.A.: Asymptotic theory of certain \u201cgoodness of fit \u201d criteria based on stochastic processes. Ann. Math. Stat. 23(2), 193\u2013212 (1952)","DOI":"10.1214\/aoms\/1177729437"},{"issue":"3","key":"5_CR3","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1177\/109442810033005","volume":"3","author":"AG Bedeian","year":"2000","unstructured":"Bedeian, A.G., Mossholder, K.W.: On the use of the coefficient of variation as a measure of diversity. Organ. Res. Meth. 3(3), 285\u2013297 (2000)","journal-title":"Organ. Res. Meth."},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: IEEE SP (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Carpenter, B., et\u00a0al.: Stan: a probabilistic programming language. J. Stat. Softw. 76 (2017)","DOI":"10.18637\/jss.v076.i01"},{"key":"5_CR6","unstructured":"DeVries, T., Taylor, G.W.: Learning confidence for out-of-distribution detection in neural networks. arXiv:1802.04865 (2018)"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Dong, X., et\u00a0al.: Neural mean discrepancy for efficient out-of-distribution detection. In: CVPR (2022)","DOI":"10.1109\/CVPR52688.2022.01862"},{"key":"5_CR8","unstructured":"Gomes, E.D.C., et\u00a0al.: IGEOOD: an information geometry approach to out-of-distribution detection. In: ICLR (2022)"},{"key":"5_CR9","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv:1412.6572 (2014)"},{"key":"5_CR10","unstructured":"Guo, C., et\u00a0al.: Simple black-box adversarial attacks. In: ICML, pp. 2484\u20132493 (2019)"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Huang, X., et\u00a0al.: A survey of safety and trustworthiness of deep neural networks: verification, testing, adversarial attack and defence, and interpretability. Computer Science Review (2020)","DOI":"10.1016\/j.cosrev.2020.100270"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Jeong, Y.H., Hwang, S., Chae, D.K.: HiLite: hierarchical level-implemented architecture attaining part-whole interpretability. In: CIKM (2024)","DOI":"10.1145\/3627673.3679538"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Kamal, M.S., et\u00a0al.: An interpretable framework for identifying cerebral microbleeds and Alzheimer\u2019s disease severity using multimodal data. In: EMBC (2023)","DOI":"10.1109\/EMBC40787.2023.10340088"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Khakzar, A., et\u00a0al.: Neural response interpretation through the lens of critical pathways. In: CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.01332"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Kherchouche, A., et\u00a0al.: Detection of adversarial examples in deep neural networks with natural scene statistics. In: IJCNN (2020)","DOI":"10.1109\/IJCNN48605.2020.9206959"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Kim, S., Chae, D.K.: ExMeshCNN: an explainable convolutional neural network architecture for 3D shape analysis. In: SIGKDD (2022)","DOI":"10.1145\/3534678.3539463"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Kim, S., Chae, D.K.: What does a model really look at?: extracting model-oriented concepts for explaining deep neural networks. IEEE TPAMI 46(7) (2024)","DOI":"10.1109\/TPAMI.2024.3357717"},{"key":"5_CR18","unstructured":"Lee, K., Lee, K., Lee, H., Shin, J.: A simple unified framework for detecting out-of-distribution samples and adversarial attacks. In: NIPS (2018)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Li, X., Li, F.: Adversarial examples detection in deep networks with convolutional filter statistics. In: ICCV (2017)","DOI":"10.1109\/ICCV.2017.615"},{"key":"5_CR20","unstructured":"Liang, S., Li, Y., Srikant, R.: Enhancing the reliability of out-of-distribution image detection in neural networks. In: ICLR (2018)"},{"key":"5_CR21","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/j.neucom.2021.05.102","volume":"470","author":"J Lust","year":"2022","unstructured":"Lust, J., Condurache, A.P.: Efficient detection of adversarial, out-of-distribution and other misclassified samples. Neurocomputing 470, 335\u2013343 (2022)","journal-title":"Neurocomputing"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Ma, S., et\u00a0al.: NIC: detecting adversarial samples with neural network invariant checking. In: NDSS (2019)","DOI":"10.14722\/ndss.2019.23415"},{"key":"5_CR23","unstructured":"Ma, X., et\u00a0al.: Characterizing adversarial subspaces using local intrinsic dimensionality. In: ICLR (2018)"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Mac\u00eado, D., et\u00a0al.: Entropic out-of-distribution detection. In: IJCNN (2021)","DOI":"10.1109\/IJCNN52387.2021.9533899"},{"key":"5_CR25","unstructured":"Madry, A., et\u00a0al.: Towards deep learning models resistant to adversarial attacks. arXiv:1706.06083 (2017)"},{"key":"5_CR26","unstructured":"Murphy, K.P.: Machine learning: a probabilistic perspective (2012)"},{"key":"5_CR27","unstructured":"Netzer, Y., et\u00a0al.: Reading digits in natural images with unsupervised feature learning (2011)"},{"key":"5_CR28","unstructured":"Nicolae, M.I., et\u00a0al.: Adversarial robustness toolbox v1.2.0. arXiv:1807.01069 (2022)"},{"key":"5_CR29","unstructured":"Nie, J., et\u00a0al.: Towards category unification of 3D single object tracking on point clouds. In: ICLR"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Oberdiek, P., Rottmann, M., Gottschalk, H.: Classification uncertainty of deep neural networks based on gradient information. In: IAPR Workshop (2018)","DOI":"10.1007\/978-3-319-99978-4_9"},{"key":"5_CR31","unstructured":"Press, W.H., Teukolsky, S.A., Vetterling, W.T., Flannery, B.P.: Numerical recipes 3rd edition: The art of scientific computing. Cambridge university press (2007)"},{"key":"5_CR32","unstructured":"Roth, K., Kilcher, Y., Hofmann, T.: The odds are odd: A statistical test for detecting adversarial examples. In: ICML (2019)"},{"key":"5_CR33","unstructured":"Sastry, C.S., Oore, S.: Detecting out-of-distribution examples with gram matrices. In: ICML (2020)"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., et\u00a0al.: Grad-CAM: visual explanations from deep networks via gradient-based localization. In: CVPR, pp. 618\u2013626 (2017)","DOI":"10.1109\/ICCV.2017.74"},{"issue":"1","key":"5_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-020-00105-y","volume":"2020","author":"A Sotgiu","year":"2020","unstructured":"Sotgiu, A., et al.: Deep neural rejection against adversarial examples. EURASIP J. Inf. Secur. 2020(1), 1\u201310 (2020). https:\/\/doi.org\/10.1186\/s13635-020-00105-y","journal-title":"EURASIP J. Inf. Secur."},{"key":"5_CR36","unstructured":"Tramer, F.: Detecting adversarial examples is (nearly) as hard as classifying them. In: ICML (2022)"},{"key":"5_CR37","unstructured":"Tramer, F., et\u00a0al.: On adaptive attacks to adversarial example defenses. In: NIPS (2020)"},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"Wang, Y., et\u00a0al.: Interpret neural networks by identifying critical data routing paths. In: CVPR (2018)","DOI":"10.1109\/CVPR.2018.00928"},{"key":"5_CR39","unstructured":"Yang, K., et\u00a0al.: Class-disentanglement and applications in adversarial detection and defense. In: NIPS (2021)"},{"key":"5_CR40","doi-asserted-by":"crossref","unstructured":"Yang, P., et\u00a0al.: ML-LOO: detecting adversarial examples with feature attribution. In: AAAI (2020)","DOI":"10.1609\/aaai.v34i04.6140"},{"key":"5_CR41","unstructured":"Yu, F., Qin, Z., Chen, X.: Distilling critical paths in convolutional neural networks. arXiv:1811.02643 (2018)"},{"key":"5_CR42","doi-asserted-by":"crossref","unstructured":"Zhang, Z., et\u00a0al.: Out-of-distribution detection through relative activation-deactivation abstractions. In: ISSRE (2021)","DOI":"10.1109\/ISSRE52982.2021.00027"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-8170-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T18:50:43Z","timestamp":1749927043000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-8170-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819681693","9789819681709"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-8170-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pakdd2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}