{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:37:18Z","timestamp":1774629438718,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2021,3,23]],"date-time":"2021-03-23T00:00:00Z","timestamp":1616457600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,23]],"date-time":"2021-03-23T00:00:00Z","timestamp":1616457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11042-020-10379-6","type":"journal-article","created":{"date-parts":[[2021,3,23]],"date-time":"2021-03-23T12:08:45Z","timestamp":1616501325000},"page":"22077-22095","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["CNN adversarial attack mitigation using perturbed samples training"],"prefix":"10.1007","volume":"80","author":[{"given":"Atiye Sadat","family":"Hashemi","sequence":"first","affiliation":[]},{"given":"Saeed","family":"Mozaffari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,23]]},"reference":[{"key":"10379_CR1","doi-asserted-by":"crossref","unstructured":"Boyat AK, Joshi BK (2015) A review paper: noise models in digital image processing. arXiv:1505.03489","DOI":"10.5121\/sipij.2015.6206"},{"key":"10379_CR2","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 IEEE symposium on security and privacy (sp). IEEE, pp 39\u201357","DOI":"10.1109\/SP.2017.49"},{"issue":"4","key":"10379_CR3","doi-asserted-by":"publisher","first-page":"968","DOI":"10.1109\/TNNLS.2018.2852738","volume":"30","author":"A Creswell","year":"2018","unstructured":"Creswell A, Bharath AA (2018) Denoising adversarial autoencoders. IEEE Trans Neural Netw Learn Syst 30(4):968\u2013984","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"10379_CR4","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1016\/j.patrec.2019.06.028","volume":"125","author":"T Deng","year":"2019","unstructured":"Deng T, Zeng Z (2019) Generate adversarial examples by spatially perturbing on the meaningful area. Pattern Recogn Lett 125:632\u2013638","journal-title":"Pattern Recogn Lett"},{"key":"10379_CR5","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.compeleceng.2019.01.004","volume":"74","author":"M Diale","year":"2019","unstructured":"Diale M, Celik T, Van Der Walt C (2019) Unsupervised feature learning for spam email filtering. Comput Electr Eng 74:89\u2013104","journal-title":"Comput Electr Eng"},{"key":"10379_CR6","unstructured":"Ding GW, Wang L, Jin X (2019) AdverTorch v0.1: an adversarial robustness toolbox based on pytorch. arXiv:1902.07623"},{"key":"10379_CR7","doi-asserted-by":"crossref","unstructured":"Dong Y, Liao F, Pang T, Su H, Zhu J, Hu X, Li J (2018) Boosting adversarial attacks with momentum. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 9185\u20139193","DOI":"10.1109\/CVPR.2018.00957"},{"key":"10379_CR8","unstructured":"Ford N, Gilmer J, Carlini N, Cubuk D (2019) Adversarial examples are a natural consequence of test error in noise. arXiv:1901.10513"},{"key":"10379_CR9","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv:1412.6572"},{"key":"10379_CR10","unstructured":"Gu S, Rigazio L (2014) Towards deep neural network architectures robust to adversarial examples. arXiv:1412.5068"},{"key":"10379_CR11","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/j.cose.2019.06.012","volume":"86","author":"AS Hashemi","year":"2019","unstructured":"Hashemi AS, Mozaffari S (2019) Secure deep neural networks using adversarial image generation and training with Noise-GAN. Comput Secur 86:372\u2013387","journal-title":"Comput Secur"},{"key":"10379_CR12","doi-asserted-by":"crossref","unstructured":"He Z, Rakin AS, Fan D (2019) Parametric noise injection: trainable randomness to improve deep neural network robustness against adversarial attack. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 588\u2013597","DOI":"10.1109\/CVPR.2019.00068"},{"key":"10379_CR13","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"10379_CR14","unstructured":"Hendrycks D, Dietterich TG (2018) Benchmarking neural network robustness to common corruptions and surface variations. arXiv:1807.01697"},{"key":"10379_CR15","doi-asserted-by":"crossref","unstructured":"Hu H, Li Y, Zhu Z, Zhou G (2018) CNNAuth: continuous authentication via two-stream convolutional neural networks. In: 2018 IEEE International conference on networking, architecture and storage (NAS). IEEE, pp 1\u20139","DOI":"10.1109\/NAS.2018.8515693"},{"key":"10379_CR16","unstructured":"Jeong JH, Kwon S, Hong M-P, Kwak J, Shon T (2019) Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance. Multimed Tools Applic, 1\u201315"},{"key":"10379_CR17","unstructured":"Karpathy A, et al. (2016) Cs231n convolutional neural networks for visual recognition. Neur Netw, 1(1)"},{"key":"10379_CR18","doi-asserted-by":"crossref","unstructured":"Khamparia A, Saini G, Pandey B, Tiwari S, Gupta D, Khanna A (2019) KDSAE: chronic kidney disease classification with multimedia data learning using deep stacked autoencoder network. Multimedia Tools and Applications, 1\u201316","DOI":"10.1007\/s11042-019-07839-z"},{"key":"10379_CR19","unstructured":"Kurakin A, Goodfellow I, Bengio S (2016) Adversarial examples in the physical world. arXiv:1607.02533"},{"key":"10379_CR20","doi-asserted-by":"crossref","unstructured":"Kurakin A, Goodfellow I, Bengio S, Dong Y, Liao F, Liang M, Pang T, Zhu J, Hu X, Xie C et al (2018) Adversarial attacks and defences competition. In: The NIPS\u201917 competition: building intelligent systems. Springer, pp 195\u2013231","DOI":"10.1007\/978-3-319-94042-7_11"},{"key":"10379_CR21","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.cose.2018.07.015","volume":"78","author":"H Kwon","year":"2018","unstructured":"Kwon H, Kim Y, Park K-W, Yoon H, Choi D (2018) Friend-safe evasion attack: an adversarial example that is correctly recognized by a friendly classifier. Comput Secur 78:380\u2013397","journal-title":"Comput Secur"},{"issue":"11","key":"10379_CR22","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278\u20132324","journal-title":"Proc IEEE"},{"key":"10379_CR23","unstructured":"LeCun Y, Cortes C, Burges CJ (2010) MNIST handwritten digit database"},{"key":"10379_CR24","unstructured":"Li Y, Hu H, Zhu Z, Zhou G SCANet: sensor-based continuous authentication with two-stream convolutional neural networks. ACM Transactions on Sensor Networks (TOSN)"},{"key":"10379_CR25","unstructured":"Liu Y, Chen X, Liu C, Song D (2016) Delving into transferable adversarial examples and black-box attacks. arXiv:1611.02770"},{"key":"10379_CR26","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2017) Towards deep learning models resistant to adversarial attacks. arXiv:1706.06083"},{"key":"10379_CR27","doi-asserted-by":"crossref","unstructured":"Prakash A, Moran N, Garber S, DiLillo A, Storer J (2018) Deflecting adversarial attacks with pixel deflection. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 8571\u20138580","DOI":"10.1109\/CVPR.2018.00894"},{"key":"10379_CR28","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.compeleceng.2018.04.003","volume":"68","author":"X Song","year":"2018","unstructured":"Song X, Rui T, Zhang S, Fei J, Wang X (2018) A road segmentation method based on the deep auto-encoder with supervised learning. Comput Electr Eng 68:381\u2013388","journal-title":"Comput Electr Eng"},{"issue":"4","key":"10379_CR29","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1109\/TPAMI.2019.2909876","volume":"42","author":"G Spigler","year":"2019","unstructured":"Spigler G (2019) Denoising autoencoders for overgeneralization in neural networks. IEEE Trans Pattern Anal Mach Intell 42(4):998\u20131004","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10379_CR30","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. arXiv:1312.6199"},{"key":"10379_CR31","unstructured":"Tram\u00e8r F, Kurakin A, Papernot N, Goodfellow I, Boneh D, McDaniel P (2017) Ensemble adversarial training: attacks and defenses. arXiv:1705.07204"},{"key":"10379_CR32","doi-asserted-by":"crossref","unstructured":"Vincent P, Larochelle H, Bengio Y, Manzagol P-A (2008) Extracting and composing robust features with denoising autoencoders. In: Proceedings of the 25th international conference on machine learning, pp 1096\u20131103","DOI":"10.1145\/1390156.1390294"},{"key":"10379_CR33","doi-asserted-by":"publisher","first-page":"107012","DOI":"10.1016\/j.patcog.2019.107012","volume":"97","author":"X Wei","year":"2020","unstructured":"Wei X, Wang H, Scotney B, Wan H (2020) Minimum margin loss for deep face recognition. Pattern Recogn 97:107012","journal-title":"Pattern Recogn"},{"key":"10379_CR34","unstructured":"Xiao C, Zhu J-Y, Li B, He W, Liu M, Song D (2018) Spatially transformed adversarial examples. arXiv:1801.02612"},{"key":"10379_CR35","doi-asserted-by":"crossref","unstructured":"Xie C, Zhang Z, Zhou Z, Bai S, Wang J, Ren Z, Yuille AL (2019) Improving transferability of adversarial examples with input diversity. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2730\u20132739","DOI":"10.1109\/CVPR.2019.00284"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10379-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10379-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10379-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T05:23:17Z","timestamp":1621920197000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10379-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,23]]},"references-count":35,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10379"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10379-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,23]]},"assertion":[{"value":"11 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}