{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T11:40:12Z","timestamp":1739533212819,"version":"3.37.1"},"reference-count":46,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1080\/10447318.2023.2204697","type":"journal-article","created":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T01:24:37Z","timestamp":1682904277000},"page":"1729-1741","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Enhanced Defensive Model Using CNN against Adversarial Attacks for Medical Education through Human Computer Interaction"],"prefix":"10.1080","volume":"41","author":[{"given":"K. V.","family":"Priya","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences","place":["Coimbatore, India"]},{"name":"Sahrdaya College of Engineering and Technology","place":["Thrissur, India"]}]},{"given":"J.","family":"Dinesh Peter","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences","place":["Coimbatore, India"]}]}],"member":"301","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.4314\/tmj.v31i1.331"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1097\/00001888-199301000-00012"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.06.008"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1136\/pgmj.2005.038448"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2923.1996.tb00740.x"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/14703290903287671"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21134269"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2923.2001.01058.x"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaw4399"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2013.06.004"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.5116\/ijme.5e01.eb1a"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013681"},{"key":"e_1_3_2_16_1","unstructured":"Goodfellow I. J. Shlens J. & Szegedy C. (2014). Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572"},{"key":"e_1_3_2_17_1","volume-title":"Deep learning","author":"Goodfellow I.","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT Press."},{"key":"e_1_3_2_18_1","unstructured":"Hannun A. Case C. Casper J. Catanzaro B. Diamos G. & Elsen E. (2014). Deep speech: Scaling up end-to-end speech recognition. arXiv:1412.5567"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMp2003539"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1097\/00001888-198103000-00004"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2923.1996.tb00829.x"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2923.2000.0702b.x"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.3389\/fgene.2012.00227"},{"key":"e_1_3_2_25_1","first-page":"1097","volume-title":"Advances in Neural Information Processing Systems 25 (NIPS 2012)","author":"Krizhevsky A.","year":"2012","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G. E. (2012). ImageNet classification with deep convolutional neural networks [Paper presentation]. Advances in Neural Information Processing Systems 25 (NIPS 2012) (pp. 1097\u20131105)."},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5849736"},{"key":"e_1_3_2_28_1","first-page":"1","article-title":"A survey on adversarial attacks and defenses in medical image analysis","volume":"66","author":"Li Y.","year":"2021","unstructured":"Li, Y., Li, Z., Wang, S., Yang, X., & Liu, J. (2021). A survey on adversarial attacks and defenses in medical image analysis. Information Fusion, 66, 1\u201315.","journal-title":"Information Fusion,"},{"key":"e_1_3_2_29_1","unstructured":"Liu Y. Chen X. Liu C. & Song D. (2016). Delving into transferable adversarial examples and black-box attacks. arXiv preprint arXiv:1611.02770"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_31_1","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/978-3-319-45142-8","volume-title":"Anticipation and medicine","author":"Nadin M.","year":"2017","unstructured":"Nadin, M. (2017). Anticipation and medicine smart watches for physiological monitoring. A case study on blood pressure measurement. In Anticipation and medicine (pp. 231\u2013252). Springer."},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMp1606181"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijieeb.2017.03.06"},{"key":"e_1_3_2_34_1","unstructured":"Ortiz-Ospina E. (2020). Robot-assisted surgery. Our world in data. https:\/\/ourworldindata.org\/robot-assisted-surgery."},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3026214"},{"key":"e_1_3_2_36_1","unstructured":"Papernot N. McDaniel P. & Goodfellow I. (2016). Transferability in machine learning: From phenomena to black-box attacks using adversarial samples. arXiv:1605.07277."},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jacr.2009.11.002"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2923.2000.0706a.x"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-018-0029-1"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1097\/00001888-200603000-00002"},{"key":"e_1_3_2_42_1","unstructured":"Simonyan K. & Zisserman A. (2014). Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556."},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-021-00324-z"},{"key":"e_1_3_2_44_1","unstructured":"Szegedy C. Zaremba W. Sutskever I. Bruna J. Erhan D. Goodfellow I. & Fergus R. (2013). Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.153"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5849736"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33012253"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2023.2204697","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T10:58:25Z","timestamp":1739530705000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2023.2204697"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":46,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["10.1080\/10447318.2023.2204697"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2023.2204697","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"type":"print","value":"1044-7318"},{"type":"electronic","value":"1532-7590"}],"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-11-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-31","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-04-16","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}