{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T08:29:00Z","timestamp":1768638540135,"version":"3.49.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T00:00:00Z","timestamp":1630886400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T00:00:00Z","timestamp":1630886400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012335","name":"National Defense Basic Scientific Research Program of China","doi-asserted-by":"publisher","award":["JCKY2018603B006"],"award-info":[{"award-number":["JCKY2018603B006"]}],"id":[{"id":"10.13039\/501100012335","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s10489-021-02759-8","type":"journal-article","created":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T04:02:30Z","timestamp":1630900950000},"page":"6262-6275","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Adversarial example detection based on saliency map features"],"prefix":"10.1007","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5748-5438","authenticated-orcid":false,"given":"Shen","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yuxin","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,6]]},"reference":[{"key":"2759_CR1","unstructured":"Santoro A, Raposo D, Barrett DG, Malinowski M, Pascanu R, Battaglia P, Lillicrap T (2017) A simple neural network module for relational reasoning. In: Advances in neural information processing systems, pp 4967\u20134976"},{"key":"2759_CR2","doi-asserted-by":"crossref","unstructured":"Grosse K, Papernot N, Manoharan P, Backes M, McDaniel P (2017) Adversarial examples for malware detection. In: European symposium on research in computer security. Springer, pp 62\u201379","DOI":"10.1007\/978-3-319-66399-9_4"},{"key":"2759_CR3","doi-asserted-by":"crossref","unstructured":"Deng Y, Xi Z, Zhang T, Chen C, Lou G, Kim M (2020) An analysis of adversarial attacks and defenses on autonomous driving models. In: 2020 IEEE international conference on pervasive computing and communications (PerCom). IEEE, pp 1\u201310","DOI":"10.1109\/PerCom45495.2020.9127389"},{"key":"2759_CR4","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner D (2018) Audio adversarial examples: Targeted attacks on speech-to-text. In: 2018 IEEE security and privacy workshops (SPW). IEEE, pp 1\u20137","DOI":"10.1109\/SPW.2018.00009"},{"key":"2759_CR5","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar N, Mian A (2018) Threat of adversarial attacks on deep learning in computer vision: A survey. IEEE Access 6:14410\u201314430","journal-title":"IEEE Access"},{"key":"2759_CR6","unstructured":"Ma X, Li B, Wang Y, Erfani SM, Wijewickrema S, Schoenebeck G, Song D, Houle ME, Bailey J (2018) Characterizing adversarial subspaces using local intrinsic dimensionality. arXiv:1801.02613"},{"key":"2759_CR7","unstructured":"Lee K, Lee K, Lee H, Shin J (2018) A simple unified framework for detecting out-of-distribution samples and adversarial attacks. In: Advances in neural information processing systems, pp 7167\u20137177"},{"key":"2759_CR8","unstructured":"Liang B, Li H, Su M, Li X, Shi W, Wang X (2018) Detecting adversarial image examples in deep neural networks with adaptive noise reduction. IEEE Trans Dependable Secure Comput"},{"key":"2759_CR9","unstructured":"Tao G, Ma S, Liu Y, Zhang X (2018) Attacks meet interpretability: Attribute-steered detection of adversarial samples. In: Advances in neural information processing systems, pp 7717\u20137728"},{"key":"2759_CR10","doi-asserted-by":"crossref","unstructured":"Fidel G, Bitton R, Shabtai A (2020) When explainability meets adversarial learning: Detecting adversarial examples using shap signatures. In: 2020 international joint conference on neural networks (IJCNN). IEEE, pp 1\u20138","DOI":"10.1109\/IJCNN48605.2020.9207637"},{"key":"2759_CR11","unstructured":"Yin X, Kolouri S, Rohde GK (2019) Gat: Generative adversarial training for adversarial example detection and robust classification. In: International conference on learning representations"},{"key":"2759_CR12","doi-asserted-by":"crossref","unstructured":"Zhang C, Ye Z, Wang Y, Yang Z (2018) Detecting adversarial perturbations with saliency. In: 2018 IEEE 3rd international conference on signal and image processing (ICSIP). IEEE, pp 271\u2013275","DOI":"10.1109\/SIPROCESS.2018.8600516"},{"key":"2759_CR13","doi-asserted-by":"crossref","unstructured":"Fong RC, Vedaldi A (2017) Interpretable explanations of black boxes by meaningful perturbation. In: Proceedings of the IEEE international conference on computer vision, pp 3429\u20133437","DOI":"10.1109\/ICCV.2017.371"},{"key":"2759_CR14","unstructured":"Springenberg JT, Dosovitskiy A, Brox T, Riedmiller M (2014) Striving for simplicity: The all convolutional net. arXiv:1412.6806"},{"key":"2759_CR15","doi-asserted-by":"crossref","unstructured":"Selvaraju RR, Cogswell M, Das A, Vedantam R, Parikh D, Batra D (2017) Grad-cam: Visual explanations from deep networks via gradient-based localization. In: Proceedings of the IEEE international conference on computer vision, pp 618\u2013626","DOI":"10.1109\/ICCV.2017.74"},{"key":"2759_CR16","doi-asserted-by":"crossref","unstructured":"Garg M, Dhiman G (2020) A novel content-based image retrieval approach for classification using glcm features and texture fused lbp variants. Neural Comput Appl :1\u201318","DOI":"10.1007\/s00521-020-05017-z"},{"issue":"9","key":"2759_CR17","doi-asserted-by":"publisher","first-page":"2805","DOI":"10.1109\/TNNLS.2018.2886017","volume":"30","author":"X Yuan","year":"2019","unstructured":"Yuan X, He P, Zhu Q, Li X (2019) Adversarial examples: Attacks and defenses for deep learning. IEEE Trans Neural Netw Learn Syst 30(9):2805\u20132824","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"2759_CR18","doi-asserted-by":"crossref","unstructured":"Papernot N, McDaniel P, Goodfellow I, Jha S, Berkay Celik Z, Swami A (2017) Practical black-box attacks against machine learning. In: Proceedings of the 2017 ACM on asia conference on computer and communications security, pp 506\u2013 519","DOI":"10.1145\/3052973.3053009"},{"key":"2759_CR19","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv:1412.6572"},{"key":"2759_CR20","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2017) Towards deep learning models resistant to adversarial attacks. arXiv:1706.06083"},{"key":"2759_CR21","doi-asserted-by":"crossref","unstructured":"Dong Y, Liao F, Pang T, Hang S u, Zhu J, Hu X, Li J (2018) Boosting adversarial attacks with momentum. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 9185\u20139193","DOI":"10.1109\/CVPR.2018.00957"},{"key":"2759_CR22","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 IEEE symposium on security and privacy (SP). IEEE, pp 39\u201357","DOI":"10.1109\/SP.2017.49"},{"key":"2759_CR23","doi-asserted-by":"publisher","first-page":"107584","DOI":"10.1016\/j.patcog.2020.107584","volume":"110","author":"D Li","year":"2021","unstructured":"Li D, Zhang J, Huang K (2021) Universal adversarial perturbations against object detection. Pattern Recogn 110:107584","journal-title":"Pattern Recogn"},{"key":"2759_CR24","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli S-M, Fawzi A, Fawzi O, Frossard P (2017) Universal adversarial perturbations. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1765\u20131773","DOI":"10.1109\/CVPR.2017.17"},{"key":"2759_CR25","doi-asserted-by":"crossref","unstructured":"Xie C, Wang J, Zhang Z, Zhou Y, Xie L, Yuille A (2017) Adversarial examples for semantic segmentation and object detection. In: Proceedings of the IEEE international conference on computer vision, pp 1369\u20131378","DOI":"10.1109\/ICCV.2017.153"},{"key":"2759_CR26","doi-asserted-by":"crossref","unstructured":"Li X, Li F (2017) Adversarial examples detection in deep networks with convolutional filter statistics. In: Proceedings of the IEEE international conference on computer vision, pp 5764\u2013 5772","DOI":"10.1109\/ICCV.2017.615"},{"key":"2759_CR27","doi-asserted-by":"crossref","unstructured":"Kherchouche A, Fezza SA, Hamidouche W, D\u00e9forges O (2020) Natural scene statistics for detecting adversarial examples in deep neural networks. In: 2020 IEEE 22nd international workshop on multimedia signal processing (MMSP). IEEE, pp 1\u20136","DOI":"10.1109\/MMSP48831.2020.9287056"},{"key":"2759_CR28","unstructured":"Lundberg S, Lee S-I (2017) A unified approach to interpreting model predictions. arXiv:1705.07874"},{"key":"2759_CR29","doi-asserted-by":"crossref","unstructured":"Deng J, Dong W, Socher R, Li L-J, Li K, Fei-Fei L (2009) Imagenet A large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition. IEEE, pp 248\u2013255","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"2759_CR30","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556"},{"key":"2759_CR31","unstructured":"Alex K, Hinton G et al (2009) Learning multiple layers of features from tiny images"},{"key":"2759_CR32","unstructured":"Kingma DP, Ba J (2014) Adam: A method for stochastic optimization. arXiv:1412.6980"},{"key":"2759_CR33","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02759-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-02759-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02759-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T04:19:03Z","timestamp":1649823543000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-02759-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,6]]},"references-count":33,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["2759"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-02759-8","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,6]]},"assertion":[{"value":"9 August 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}