{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T20:42:53Z","timestamp":1773002573260,"version":"3.50.1"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T00:00:00Z","timestamp":1749600000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T00:00:00Z","timestamp":1749600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Autonomous Government of Castilla-La Mancha, ERDF and the European Commission","award":["101120726, SBPLY\/21\/180501\/000025"],"award-info":[{"award-number":["101120726, SBPLY\/21\/180501\/000025"]}]},{"name":"Autonomous Government of Castilla-La Mancha, ERDF and the European Commission","award":["101120726, SBPLY\/21\/180501\/000025"],"award-info":[{"award-number":["101120726, SBPLY\/21\/180501\/000025"]}]},{"name":"Autonomous Government of Castilla-La Mancha, ERDF and the European Commission","award":["101120726, SBPLY\/21\/180501\/000025"],"award-info":[{"award-number":["101120726, SBPLY\/21\/180501\/000025"]}]},{"name":"Autonomous Government of Castilla-La Mancha, ERDF and the European Commission","award":["101120726, SBPLY\/21\/180501\/000025"],"award-info":[{"award-number":["101120726, SBPLY\/21\/180501\/000025"]}]},{"DOI":"10.13039\/501100007480","name":"Universidad de Castilla la Mancha","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007480","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,10]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>In the realm of deep learning, deep neural networks (DNNs) have recently propelled significant advancements in image classification applications. However, these DNN models are vulnerable to adversarial examples (AE), which are crafted by introducing imperceptible perturbations to legitimate samples, leading the models to make incorrect predictions. Time-series (TS) data are prevalent in real-world applications and naturally occurring phenomena. To recover and infer missing information, TS analysis has been extensively explored as a foundational research problem. The introduction of imperceptible perturbations induces irregularities in TS, resulting in chaotic behavior. Chaos, marked by a lack of organization and structure, is expected to play diverse functional roles in dynamical systems when analyzed through TS. By applying chaos theory to TS analysis, we aim to identify chaotic behavior to detect the subtle input perturbations added by the adversarial attacks. Chaos theory faces significant challenges when applied to the analysis or computation of chaotic systems due to the minimal and subtle nature of the perturbations introduced by adversarial attacks. Nonetheless, detecting chaos amidst adversarial perturbations is crucial for defending against such attacks. In this paper, we utilize features derived from ordinal patterns (OP) through TS analysis to detect the presence or absence of chaos, even under sophisticated attack methods. As an initial application of our pipeline, we exploit the edge-preserving capabilities of the guided filter (GF) and the spatial proximity properties of the Hilbert space-filling curve (HSFC) to represent the TS of input images. Experimental results show that our proposed method effectively identifies adversarial perturbations across various attacks on diverse datasets, including MNIST, Fashion-MNIST (FMNIST), CIFAR-10 and CIFAR-100.<\/jats:p>","DOI":"10.1007\/s13042-025-02702-0","type":"journal-article","created":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T12:05:00Z","timestamp":1749643500000},"page":"8041-8062","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detection of adversarial examples through chaos quantification in time-series analysis"],"prefix":"10.1007","volume":"16","author":[{"given":"Harbinder","family":"Singh","sequence":"first","affiliation":[]},{"given":"Anibal","family":"Pedraza","sequence":"additional","affiliation":[]},{"given":"Oscar","family":"Deniz","sequence":"additional","affiliation":[]},{"given":"Gloria","family":"Bueno","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,11]]},"reference":[{"issue":"6","key":"2702_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2017) Imagenet classification with deep convolutional neural networks. Commun ACM 60(6):84\u201390","journal-title":"Commun ACM"},{"key":"2702_CR2","doi-asserted-by":"crossref","unstructured":"Mart\u00ednez-D\u00edaz M, Soriguera F (2018) Autonomous vehicles: theoretical and practical challenges. Transportation Research Procedia 33, 275\u2013282. XIII Conference on Transport Engineering, CIT2018","DOI":"10.1016\/j.trpro.2018.10.103"},{"key":"2702_CR3","unstructured":"Radford A, Kim JW, Xu T, Brockman G, McLeavey C, Sutskever I (2022) Robust Speech Recognition via Large-Scale Weak Supervision. https:\/\/arxiv.org\/abs\/2212.04356"},{"key":"2702_CR4","doi-asserted-by":"publisher","first-page":"93145","DOI":"10.1109\/ACCESS.2020.2993887","volume":"8","author":"H Tang","year":"2020","unstructured":"Tang H, Hu Z (2020) Research on medical image classification based on machine learning. IEEE Access 8:93145\u201393154. https:\/\/doi.org\/10.1109\/ACCESS.2020.2993887","journal-title":"IEEE Access"},{"key":"2702_CR5","unstructured":"Sutskever I, Vinyals O, Le QV (2014) Sequence to Sequence Learning with Neural Networks. https:\/\/arxiv.org\/abs\/1409.3215"},{"key":"2702_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102847","volume":"121","author":"T Long","year":"2022","unstructured":"Long T, Gao Q, Xu L, Zhou Z (2022) A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions. Comput Secur 121:102847","journal-title":"Comput Secur"},{"issue":"12","key":"2702_CR7","doi-asserted-by":"publisher","first-page":"9797","DOI":"10.1109\/TPAMI.2024.3430860","volume":"46","author":"H Wei","year":"2024","unstructured":"Wei H, Tang H, Jia X, Wang Z, Yu H, Li Z, Satoh S, Van Gool L, Wang Z (2024) Physical Adversarial Attack Meets Computer Vision: A Decade Survey. IEEE Transactions on Pattern Analysis & Machine Intelligence 46(12):9797\u20139817","journal-title":"IEEE Transactions on Pattern Analysis & Machine Intelligence"},{"key":"2702_CR8","doi-asserted-by":"crossref","unstructured":"Wang H, Dong K, Zhu Z, Qin H, Liu A, Fang X, Wang J Liu X (2024) Transferable multimodal attack on vision-language pre-training models. In: 2024 IEEE Symposium on Security and Privacy (SP), pp. 1722\u20131740","DOI":"10.1109\/SP54263.2024.00102"},{"key":"2702_CR9","unstructured":"Cao Y, Xiao C, Yang D, Fang J, Yang R, Liu M, Li B (2019) Adversarial objects against lidar-based autonomous driving systems. CoRR arXiv:1907.05418"},{"key":"2702_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107332","volume":"110","author":"X Ma","year":"2021","unstructured":"Ma X, Niu Y, Gu L, Wang Y, Zhao Y, Bailey J, Lu F (2021) Understanding adversarial attacks on deep learning based medical image analysis systems. Pattern Recogn 110:107332","journal-title":"Pattern Recogn"},{"key":"2702_CR11","doi-asserted-by":"crossref","unstructured":"Dalvi N, Domingos P, Mausam, Sanghai S, Verma D (2004) Adversarial classification. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD \u201904, pp. 99\u2013108. Association for Computing Machinery, New York, NY, USA","DOI":"10.1145\/1014052.1014066"},{"key":"2702_CR12","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2014) Intriguing properties of neural networks . https:\/\/arxiv.org\/abs\/1312.6199"},{"key":"2702_CR13","unstructured":"Liu Y, Chen X, Liu C, Song D (2017) Delving into transferable adversarial examples and black-box attacks. arXiv preprint arXiv:1611.02770"},{"key":"2702_CR14","unstructured":"Papernot N, McDaniel P, Goodfellow I (2016) Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples. https:\/\/arxiv.org\/abs\/1605.07277"},{"key":"2702_CR15","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. International Conference on Learning Representations (ICLR)"},{"key":"2702_CR16","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1109\/TIFS.2022.3226905","volume":"18","author":"N Aafaq","year":"2023","unstructured":"Aafaq N, Akhtar N, Liu W, Shah M, Mian A (2023) Language model agnostic gray-box adversarial attack on image captioning. IEEE Trans Inf Forensics Secur 18:626\u2013638","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2702_CR17","unstructured":"Brendel W, Rauber J, Bethge M (2018) Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models. https:\/\/arxiv.org\/abs\/1712.04248"},{"key":"2702_CR18","doi-asserted-by":"crossref","unstructured":"Chen J, Jordan MI, Wainwright MJ (2020) HopSkipJumpAttack: A query-efficient decision-based attack. In: 2020 IEEE Symposium on Security and Privacy (sp), pp. 1277\u20131294 . IEEE","DOI":"10.1109\/SP40000.2020.00045"},{"key":"2702_CR19","doi-asserted-by":"publisher","first-page":"155161","DOI":"10.1109\/ACCESS.2021.3127960","volume":"9","author":"N Akhtar","year":"2021","unstructured":"Akhtar N, Mian A, Kardan N, Shah M (2021) Advances in adversarial attacks and defenses in computer vision: A survey. IEEE Access 9:155161\u2013155196. https:\/\/doi.org\/10.1109\/ACCESS.2021.3127960","journal-title":"IEEE Access"},{"key":"2702_CR20","unstructured":"Kurakin A, Goodfellow IJ, Bengio S (2016) Adversarial examples in the physical world. CoRR arXiv:1607.02533"},{"key":"2702_CR21","doi-asserted-by":"publisher","unstructured":"Papernot N, McDaniel P, Jha S, Fredrikson M, Celik ZB, Swami A (2016) The limitations of deep learning in adversarial settings. In: 2016 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 372\u2013387. https:\/\/doi.org\/10.1109\/EuroSP.2016.36","DOI":"10.1109\/EuroSP.2016.36"},{"key":"2702_CR22","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner DA (2016) Towards evaluating the robustness of neural networks. CoRR arXiv:1608.04644","DOI":"10.1109\/SP.2017.49"},{"key":"2702_CR23","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2018) Towards deep learning models resistant to adversarial attacks. International Conference on Learning Representations (ICLR)"},{"key":"2702_CR24","unstructured":"Zhang C, Xu X, Wu J, Liu Z, Zhou L (2024) Adversarial Attacks of Vision Tasks in the Past 10 Years: A Survey . https:\/\/arxiv.org\/abs\/2410.23687"},{"key":"2702_CR25","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1109\/OJSP.2023.3275053","volume":"4","author":"Y Ji","year":"2023","unstructured":"Ji Y, Le T-N, Nguyen HH, Echizen I (2023) Purifying adversarial images using adversarial autoencoder with conditional normalizing flows. IEEE Open Journal of Signal Processing 4:267\u2013274","journal-title":"IEEE Open Journal of Signal Processing"},{"issue":"7","key":"2702_CR26","doi-asserted-by":"publisher","first-page":"2578","DOI":"10.1109\/TNNLS.2019.2933524","volume":"31","author":"J Zhang","year":"2020","unstructured":"Zhang J, Li C (2020) Adversarial examples: Opportunities and challenges. IEEE Transactions on Neural Networks and Learning Systems 31(7):2578\u20132593. https:\/\/doi.org\/10.1109\/TNNLS.2019.2933524","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"2702_CR27","unstructured":"Tramr F, Kurakin A, Papernot N, Goodfellow I, Boneh D, McDaniel P (2020) Ensemble Adversarial Training: Attacks and Defenses. https:\/\/arxiv.org\/abs\/1705.07204"},{"key":"2702_CR28","doi-asserted-by":"crossref","unstructured":"Zhang S, Qian Z, Huang K, Wang Q-F, Gu B, Xiong H, Yi X (2024) Inter-feature relationship certifies robust generalization of adversarial training. International Journal of Computer Vision, 1\u201317","DOI":"10.1007\/s11263-024-02111-w"},{"issue":"2","key":"2702_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13735-024-00330-y","volume":"13","author":"Y Li","year":"2024","unstructured":"Li Y, Guo Y, Wu Y, Xie Y, Lao M, Yu T, Ruan Y (2024) RDAT: an efficient regularized decoupled adversarial training mechanism. International Journal of Multimedia Information Retrieval 13(2):1\u201313","journal-title":"International Journal of Multimedia Information Retrieval"},{"key":"2702_CR30","doi-asserted-by":"crossref","unstructured":"Huang B, Wang Y, Wang W (2019) Model-agnostic adversarial detection by random perturbations. In: Proceedings of the 28th International Joint Conference on Artificial Intelligence. IJCAI\u201919, pp. 4689\u20134696. AAAI Press, Macao, China","DOI":"10.24963\/ijcai.2019\/651"},{"key":"2702_CR31","unstructured":"Vacanti G, Looveren AV (2020) Adversarial Detection and Correction by Matching Prediction Distributions. https:\/\/arxiv.org\/abs\/2002.09364"},{"key":"2702_CR32","doi-asserted-by":"crossref","unstructured":"Cintas C, Speakman S, Akinwande V, Ogallo W, Weldemariam K, Sridharan S, McFowland E (2020) Detecting adversarial attacks via subset scanning of autoencoder activations and reconstruction error. In: Bessiere, C. (ed.) Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, IJCAI-20, pp. 876\u2013882","DOI":"10.24963\/ijcai.2020\/122"},{"key":"2702_CR33","doi-asserted-by":"crossref","unstructured":"Pedraza A, Deniz O, Singh H, Bueno G (2024) Leveraging autoencoders and chaos theory to improve adversarial example detection. Neural Computing and Applications, 1\u201311","DOI":"10.1007\/s00521-024-10141-1"},{"key":"2702_CR34","unstructured":"Metzen JH, Genewein T, Fischer V, Bischoff B (2017) On Detecting Adversarial Perturbations. https:\/\/arxiv.org\/abs\/1702.04267"},{"key":"2702_CR35","unstructured":"Manohar-Alers N, Feng R, Singh S, Song J, Prakash A (2021) Using anomaly feature vectors for detecting, classifying and warning of outlier adversarial examples. CoRR arXiv:2107.00561"},{"key":"2702_CR36","unstructured":"Liu J, Zhang W, Zhang Y, Hou D, Liu Y, Zha H, Yu N (2018) Detection based Defense against Adversarial Examples from the Steganalysis Point of View https:\/\/arxiv.org\/abs\/1806.09186"},{"issue":"2","key":"2702_CR37","first-page":"225","volume":"2","author":"A Thakur","year":"2015","unstructured":"Thakur A, Singh H, Sharda S (2015) Different techniques of image and video steganography: A review. International Journal of Electrical and Electronics Engineering (IJEEE) 2(2):225\u2013228","journal-title":"International Journal of Electrical and Electronics Engineering (IJEEE)"},{"issue":"07","key":"2702_CR38","first-page":"9041","volume":"45","author":"X Wei","year":"2023","unstructured":"Wei X, Guo Y, Yu J, Zhang B (2023) Simultaneously Optimizing Perturbations and Positions for Black-Box Adversarial Patch Attacks. IEEE Transactions on Pattern Analysis & Machine Intelligence 45(07):9041\u20139054","journal-title":"IEEE Transactions on Pattern Analysis & Machine Intelligence"},{"key":"2702_CR39","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.neunet.2023.03.041","volume":"163","author":"J Sun","year":"2023","unstructured":"Sun J, Yao W, Jiang T, Wang D, Chen X (2023) Differential evolution based dual adversarial camouflage: Fooling human eyes and object detectors. Neural Netw 163:256\u2013271","journal-title":"Neural Netw"},{"issue":"1","key":"2702_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12530-024-09643-z","volume":"16","author":"L Dhamija","year":"2025","unstructured":"Dhamija L, Bansalb U (2025) AFLF: a defensive framework to defeat multi-faceted adversarial attacks via attention feature fusion. Evol Syst 16(1):1\u201320","journal-title":"Evol Syst"},{"key":"2702_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2023.12.041","volume":"172","author":"R Wang","year":"2024","unstructured":"Wang R, Ke H, Hu M, Wu W (2024) Adversarially robust neural networks with feature uncertainty learning and label embedding. Neural Netw 172:106087","journal-title":"Neural Netw"},{"issue":"11","key":"2702_CR42","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.3390\/e22111201","volume":"22","author":"A Pedraza","year":"2020","unstructured":"Anibal P, Oscar D, Gloria B (2020) Approaching adversarial example classification with chaos theory. Entropy 22(11):1201","journal-title":"Entropy"},{"key":"2702_CR43","unstructured":"Prabhu VU, Desai N, Whaley J (2017) On Lyapunov exponents and adversarial perturbation. Deep Learning Security Workshop (Singapore)"},{"issue":"6","key":"2702_CR44","doi-asserted-by":"publisher","first-page":"4971","DOI":"10.1103\/PhysRevA.34.4971","volume":"34","author":"J-P Eckmann","year":"1986","unstructured":"Eckmann J-P, Kamphorst SO, Ruelle D, Ciliberto S (1986) Liapunov exponents from time series. Phys Rev A 34(6):4971","journal-title":"Phys Rev A"},{"key":"2702_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2021.111745","volume":"155","author":"A Pedraza","year":"2022","unstructured":"Pedraza A, Deniz O, Bueno G (2022) Lyapunov stability for detecting adversarial image examples. Chaos, Solitons & Fractals 155:111745","journal-title":"Chaos, Solitons & Fractals"},{"key":"2702_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.112577","volume":"163","author":"O Deniz","year":"2022","unstructured":"Deniz O, Pedraza A, Bueno G (2022) Detecting chaos in adversarial examples. Chaos, Solitons & Fractals 163:112577","journal-title":"Chaos, Solitons & Fractals"},{"key":"2702_CR47","doi-asserted-by":"crossref","unstructured":"Ardalani-Farsa M, Zolfaghari S (2010) Chaotic time series prediction with residual analysis method using hybrid elmannarx neural networks. Neurocomputing 73(13), 2540\u20132553. Pattern Recognition in Bioinformatics Advances in Neural Control","DOI":"10.1016\/j.neucom.2010.06.004"},{"key":"2702_CR48","doi-asserted-by":"crossref","unstructured":"Chen P (1996) A random walk or color chaos on the stock market? time-frequency analysis of s &p indexes. Studies in Nonlinear Dynamics & Econometrics 1(2)","DOI":"10.2202\/1558-3708.1014"},{"issue":"12","key":"2702_CR49","doi-asserted-by":"publisher","first-page":"6415","DOI":"10.3390\/e16126415","volume":"16","author":"X Su","year":"2014","unstructured":"Su X, Wang Y, Duan S, Ma J (2014) Detecting chaos from agricultural product price time series. Entropy 16(12):6415\u20136433","journal-title":"Entropy"},{"key":"2702_CR50","doi-asserted-by":"crossref","unstructured":"Raina V, Gales M (2022) Residue-based natural language adversarial attack detection. In: Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Association for Computational Linguistics, North American","DOI":"10.18653\/v1\/2022.naacl-main.281"},{"key":"2702_CR51","doi-asserted-by":"crossref","unstructured":"Wu K, Peng A, Hao Y, Zhao Q (2020) Adversarial examples detection using random projections of residuals. In: 2020 International Conference on Networking and Network Applications (NaNA), pp. 282\u2013285","DOI":"10.1109\/NaNA51271.2020.00055"},{"key":"2702_CR52","first-page":"1","volume-title":"Computer Vision - ECCV 2010","author":"K He","year":"2010","unstructured":"He K, Sun J, Tang X (2010) Guided image filtering. In: Daniilidis K, Maragos P, Paragios N (eds) Computer Vision - ECCV 2010. Springer, Berlin, Heidelberg, pp 1\u201314"},{"key":"2702_CR53","doi-asserted-by":"crossref","unstructured":"Hilbert D (1935) \u00dcber die stetige abbildung einer linie auf ein fl\u00e4chenst\u00fcck. Dritter Band: Analysis$$\\cdot$$ Grundlagen der Mathematik$$\\cdot$$ Physik Verschiedenes: Nebst Einer Lebensgeschichte, 1\u20132","DOI":"10.1007\/978-3-662-38452-7_1"},{"issue":"2","key":"2702_CR54","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1134\/S1547477118020097","volume":"15","author":"AV Kryanev","year":"2018","unstructured":"Kryanev AV, Ivanov VV, Romanova AO, Sevastyanov LA, Udumyan DK (2018) Separation of Trend and Chaotic Components of Time Series and Estimation of Their Characteristics by Linear Splines. Phys Part Nucl Lett 15(2):194\u2013197","journal-title":"Phys Part Nucl Lett"},{"key":"2702_CR55","doi-asserted-by":"publisher","first-page":"14889","DOI":"10.1073\/pnas.0701020104","volume":"104","author":"Z Wu","year":"2007","unstructured":"Wu Z, Huang NE, Long S, Peng C (2007) On the trend, detrending, and variability of nonlinear and nonstationary time series. Proc Natl Acad Sci 104:14889\u201314894. https:\/\/doi.org\/10.1073\/pnas.0701020104","journal-title":"Proc Natl Acad Sci"},{"key":"2702_CR56","doi-asserted-by":"publisher","unstructured":"Draper NR, Smith H (1998) Applied regression analysis, vol. 326. John Wiley & Sons. https:\/\/doi.org\/10.1002\/9781118625590","DOI":"10.1002\/9781118625590"},{"key":"2702_CR57","doi-asserted-by":"crossref","unstructured":"Bottou L, Cortes C, Denker JS, Drucker H, Guyon I, Jackel LD, Le Cun Y, Muller UA, S\u00e4ckinger E, Simard P, Vapnik V (1994) Comparison of classifier methods: a case study in handwritten digit recognition. In: Proceedings of the 12th IAPR International Conference on Pattern Recognition, Conference B: Computer Vision & Image Processing., vol. 2, pp. 77\u201382. IEEE, Jerusalem","DOI":"10.1109\/ICPR.1994.576879"},{"key":"2702_CR58","unstructured":"Goldsmith M (2009) The maximal Lyapunov exponent of a time series. A Thesis in The Department of Computer Science, Concordia University, Montreal, Canada"},{"key":"2702_CR59","unstructured":"Charalampos HS, Georg AG, Jacques L (2016) Chaos Detection and Predictability vol. 915. Springer Berlin, Heidelberg"},{"issue":"9","key":"2702_CR60","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0108004","volume":"9","author":"MG Ravetti","year":"2014","unstructured":"Ravetti MG, Carpi LC, Gonalves BA, Frery AC, Rosso OA (2014) Distinguishing noise from chaos: Objective versus subjective criteria using horizontal visibility graph. PLoS ONE 9(9):1\u201315","journal-title":"PLoS ONE"},{"key":"2702_CR61","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.88.174102","volume":"88","author":"C Bandt","year":"2002","unstructured":"Bandt C, Pompe B (2002) Permutation entropy: A natural complexity measure for time series. Phys Rev Lett 88:174102","journal-title":"Phys Rev Lett"},{"issue":"1","key":"2702_CR62","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.physa.2011.07.030","volume":"391","author":"OA Rosso","year":"2012","unstructured":"Rosso OA, Carpi LC, Saco PM, Gmez Ravetti M, Plastino A, Larrondo HA (2012) Causality and the entropycomplexity plane: Robustness and missing ordinal patterns. Physica A 391(1):42\u201355","journal-title":"Physica A"},{"issue":"1","key":"2702_CR63","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.physleta.2006.01.093","volume":"355","author":"JM Amig\u00f3","year":"2006","unstructured":"Amig\u00f3 JM, Kocarev L, Szczepanski J (2006) Order patterns and chaos. Phys Lett A 355(1):27\u201331","journal-title":"Phys Lett A"},{"issue":"2","key":"2702_CR64","doi-asserted-by":"publisher","DOI":"10.1063\/1.4941674","volume":"26","author":"CW Kulp","year":"2016","unstructured":"Kulp CW, Chobot JM, Niskala BJ, Needhammer CJ (2016) Using forbidden ordinal patterns to detect determinism in irregularly sampled time series. Chaos: An Interdisciplinary Journal of Nonlinear Science 26(2):023107","journal-title":"Chaos: An Interdisciplinary Journal of Nonlinear Science"},{"issue":"5","key":"2702_CR65","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/0375-9601(95)00867-5","volume":"209","author":"R Lpez-Ruiz","year":"1995","unstructured":"Lpez-Ruiz R, Mancini HL, Calbet X (1995) A statistical measure of complexity. Phys Lett A 209(5):321\u2013326","journal-title":"Phys Lett A"},{"key":"2702_CR66","unstructured":"Xiao H, Rasul K, Vollgraf R (2017) Fashion-MNIST: a novel image dataset for benchmarking machine learning algorithms. CoRR arXiv:1708.07747"},{"issue":"1\u20132","key":"2702_CR67","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/BF01016429","volume":"52","author":"C Tsallis","year":"1988","unstructured":"Tsallis C (1988) Possible generalization of Boltzmann-Gibbs statistics. J Stat Phys 52(1\u20132):479\u2013487","journal-title":"J Stat Phys"},{"key":"2702_CR68","unstructured":"R\u00e9nyi A (1961) On measures of entropy and information. In: Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability, Volume 1: Contributions to the Theory of Statistics, vol. 4, pp. 547\u2013562. University of California Press"},{"issue":"6","key":"2702_CR69","doi-asserted-by":"publisher","DOI":"10.1063\/5.0049901","volume":"31","author":"AAB Pessa","year":"2021","unstructured":"Pessa AAB, Ribeiro HV (2021) Ordpy: A python package for data analysis with permutation entropy and ordinal network methods. Chaos: An Interdisciplinary Journal of Nonlinear Science 31(6):063110","journal-title":"Chaos: An Interdisciplinary Journal of Nonlinear Science"},{"key":"2702_CR70","unstructured":"Nicolae M, Sinn M, Minh TN, Rawat A, Wistuba M, Zantedeschi V, Molloy IM, Edwards B (2018) Adversarial robustness toolbox v0.2.2. CoRR arXiv:1807.01069"},{"key":"2702_CR71","unstructured":"Krizhevsky A, Hinton G, et al (2009) Learning multiple layers of features from tiny images. Technical Report TR-2009"},{"key":"2702_CR72","unstructured":"CIFAR-100. https:\/\/www.cs.toronto.edu\/~kriz\/cifar.html (Accessed: 2024-12-03)"},{"key":"2702_CR73","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s10044-007-0061-2","volume":"10","author":"JS Snchez","year":"2007","unstructured":"Snchez JS, Mollineda RA, Sotoca JM (2007) An analysis of how training data complexity affects the nearest neighbor classifiers. Pattern Anal Appl 10:189\u2013201","journal-title":"Pattern Anal Appl"},{"key":"2702_CR74","doi-asserted-by":"publisher","unstructured":"Liu FT, Ting KM, Zhou Z-H (2008) Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413\u2013422. https:\/\/doi.org\/10.1109\/ICDM.2008.17","DOI":"10.1109\/ICDM.2008.17"},{"issue":"1","key":"2702_CR75","first-page":"157","volume":"36","author":"G Peano","year":"1980","unstructured":"Peano G (1980) Sur une courbe, qui remplit toute une aire plane. IEEE Trans Image Process 36(1):157\u2013160","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"2702_CR76","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1162\/neco.1989.1.4.541","volume":"1","author":"Y LeCun","year":"1989","unstructured":"LeCun Y, Boser B, Denker JS, Henderson D, Howard RE, Hubbard W, Jackel LD (1989) Backpropagation applied to handwritten zip code recognition. Neural Comput 1(4):541\u2013551","journal-title":"Neural Comput"},{"key":"2702_CR77","unstructured":"Lecun Y, Jackel LD, Bottou L, Cortes C, Denker J, Drucker H, Guyon I, Muller UA, Sackinger E, Simard P, Vapnik V (1995) In: Oh, J.H., Kwon, C., Cho, S. (eds.) Learning algorithms for classification: A comparison on handwritten digit recognition, pp. 261\u2013276. World Scientific, Singapore"},{"key":"2702_CR78","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"2702_CR79","doi-asserted-by":"crossref","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) Rethinking the inception architecture for computer vision. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2818\u20132826","DOI":"10.1109\/CVPR.2016.308"},{"key":"2702_CR80","unstructured":"Howard AG, Zhu M, Chen B, Kalenichenko D, Wang W, Weyand T, Andreetto M, Adam H (2017) MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications. https:\/\/api.semanticscholar.org\/CorpusID:12670695"},{"issue":"5","key":"2702_CR81","doi-asserted-by":"publisher","first-page":"794","DOI":"10.1109\/83.499920","volume":"5","author":"C Gotsman","year":"1996","unstructured":"Gotsman C, Lindenbaum M (1996) On the metric properties of discrete space-filling curves. IEEE Trans Image Process 5(5):794\u2013797. https:\/\/doi.org\/10.1109\/83.499920","journal-title":"IEEE Trans Image Process"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02702-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-025-02702-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02702-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:01:55Z","timestamp":1760547715000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-025-02702-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,11]]},"references-count":81,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2702"],"URL":"https:\/\/doi.org\/10.1007\/s13042-025-02702-0","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,11]]},"assertion":[{"value":"11 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}