{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T04:23:48Z","timestamp":1762057428376,"version":"build-2065373602"},"reference-count":72,"publisher":"Informa UK Limited","issue":"6","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2023,11,2]]},"DOI":"10.1080\/19393555.2022.2088429","type":"journal-article","created":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T10:24:26Z","timestamp":1656671066000},"page":"401-416","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["An adaptive randomized and secured approach against adversarial attacks"],"prefix":"10.1080","volume":"32","author":[{"given":"Lovi","family":"Dhamija","sequence":"first","affiliation":[{"name":"Department of Computer Science & Engineering, Dr. B.R Ambedkar National Institute of Technology, Jalandhar, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Urvashi","family":"Garg","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Engineering, Dr. B.R Ambedkar National Institute of Technology, Jalandhar, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"301","published-online":{"date-parts":[[2022,7,1]]},"reference":[{"key":"cit0001","unstructured":"300 Bird Species - Classification | Kaggle. (n.d.). Accessed September 27, 2021. https:\/\/www.kaggle.com\/gpiosenka\/100-bird-species"},{"key":"cit0002","unstructured":"Adry, A. M., Makelov, A., Schmidt, L., Tsipras, D. & Vladu, A. (n.d.). Towards Deep Learning Models Resistant to Adversarial Attacks. Accessed May 6, 2021. arXiv preprint arXiv:1706.06083. https:\/\/github.com\/MadryLab\/mnist_challenge"},{"key":"cit0003","first-page":"1","author":"Agrawal R.","year":"2019","journal-title":"ArXiv"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2958358"},{"key":"cit0005","unstructured":"Bassett, R., Graves, M. & Reilly, P. (n.d.). Color and Edge-Aware Adversarial Image Perturbations. arXiv. Accessed May 2, 2022. https:\/\/github.com\/rbassett3\/Color-and-Edge-"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10041-1"},{"journal-title":"ArXiv, Nips","year":"2017","author":"Brown T. B.","key":"cit0007"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11012-3_26"},{"journal-title":"ArXiv","year":"2019","author":"Cennamo A.","key":"cit0010"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11302"},{"key":"cit0013","unstructured":"DenseNet-121 | Kaggle. (n.d.). Accessed September 27, 2021. https:\/\/www.kaggle.com\/pytorch\/densenet121"},{"key":"cit0014","unstructured":"Denton, E., Chintala, S., Szlam, A. & Fergus, R. (2015). Deep generative image models using a laplacian pyramid of adversarial networks. Advances in Neural Information Processing Systems, 28, 2015-Janua, 1486\u20131494."},{"volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","key":"cit0015"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"cit0017","doi-asserted-by":"crossref","unstructured":"Eykholt, K., Evtimov, I., Fernandes, E., Li, B., Rahmati, A., Xiao, C., Prakash, A., Kohno, T. & song, D. (2017). Robust Physical-World Attacks on Deep Learning Models. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 1625-1634). http:\/\/arxiv.org\/abs\/1707.08945","DOI":"10.1109\/CVPR.2018.00175"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7353-6"},{"key":"cit0019","first-page":"1","volume-title":"3rd International Conference on Learning Representations, ICLR 2015 - Conference Track Proceedings","author":"Goodfellow I. J.","year":"2015"},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.084"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00015"},{"key":"cit0022","unstructured":"He, K., Zhang, X., Ren, S. & Sun, J. (n.d.). Deep Residual Learning for Image Recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 770-778). Accessed September 27, 2021. http:\/\/image-net.org\/challenges\/LSVRC\/2015\/"},{"key":"cit0023","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00283"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00624"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683044"},{"key":"cit0027","unstructured":"Kingma, D. P. & Lei Ba, J. (n.d.). Adam: A method for stochastic optimization."},{"key":"cit0028","first-page":"1","volume-title":"5th International Conference on Learning Representations, ICLR 2017 - Conference Track Proceedings","author":"Kurakin A.","year":"2017"},{"key":"cit0029","first-page":"1","volume-title":"5th International Conference on Learning Representations, ICLR 2017 - Workshop Track Proceedings, c","author":"Kurakin A.","year":"2019"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09167-z"},{"key":"cit0031","unstructured":"Landro, N., Gallo, I. & Grassa, R. L. (n.d.). Mixing ADAM and SGD: a Combined Optimization Method. arXiv preprint arXiv:2011.08042. Accessed September 27, 2021. https:\/\/gitlab.com\/nicolalandro\/multi"},{"key":"cit0032","first-page":"5775","volume-title":"Proceedings of the IEEE International Conference on Computer Vision, 2017 October","author":"Li X.","year":"2016"},{"journal-title":"ArXiv, February","year":"2018","author":"Li J.","key":"cit0033"},{"key":"cit0034","unstructured":"Li, J. B., Schmidt, F. R. & Zico Kolter, J. (n.d.). Adversarial camera stickers: A physical camera-based attack on deep learning systems, pp. 3896-3904. Accessed April 25, 2021. https:\/\/youtu.be\/wUVmL33Fx54"},{"key":"cit0035","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00191"},{"key":"cit0036","doi-asserted-by":"publisher","DOI":"10.1109\/ICICTA49267.2019.00044"},{"key":"cit0037","first-page":"1","author":"Liu X.","year":"2018","journal-title":"ArXiv"},{"journal-title":"ArXiv","year":"2018","author":"Luo Y.","key":"cit0038"},{"key":"cit0039","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2019.00369"},{"key":"cit0040","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.300"},{"key":"cit0042","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"cit0043","first-page":"1765","author":"Moosavi-Dezfooli S. M.","year":"2017","journal-title":"ArXiv"},{"key":"cit0044","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"cit0046","unstructured":"NIPS 2017: Defense Against Adversarial Attack | Kaggle. (n.d.). Accessed April 25, 2021. https:\/\/www.kaggle.com\/c\/nips-2017-defense-against-adversarial-attack"},{"key":"cit0047","first-page":"8759","volume-title":"36th International Conference on Machine Learning, ICML 2019, 2019-June","author":"Pang T.","year":"2019"},{"key":"cit0048","doi-asserted-by":"publisher","DOI":"10.17265\/2159-5313\/2016.09.003"},{"key":"cit0049","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"cit0050","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"cit0051","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"cit0052","first-page":"77","volume-title":"Proceedings - 30th IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017, 2017-Janua","author":"Qi C. R.","year":"2017"},{"key":"cit0053","first-page":"1","volume-title":"4th International Conference on Learning Representations, ICLR 2016 - Conference Track Proceedings","author":"Radford A.","year":"2016"},{"volume-title":"Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Vol. 10723 LNCS","year":"2018","author":"Raj S.","key":"cit0054"},{"key":"cit0055","first-page":"1","author":"Sahay R.","year":"2019","journal-title":"ArXiv"},{"key":"cit0056","unstructured":"Sandler, M., Howard, A., Zhu, M., Zhmoginov, A. & Chen, L.C. (n.d.). MobileNetV2: inverted residuals and linear bottlenecks. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 4510-4520)."},{"key":"cit0057","doi-asserted-by":"publisher","DOI":"10.17265\/2159-5313\/2016.09.003"},{"journal-title":"ArXiv","year":"2019","author":"Shi K.","key":"cit0058"},{"journal-title":"ArXiv","year":"2018","author":"Song Q.","key":"cit0059"},{"key":"cit0060","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"cit0061","first-page":"11447","author":"Sun B.","year":"2018","journal-title":"ArXiv"},{"key":"cit0062","first-page":"1","volume-title":"2nd International Conference on Learning Representations, ICLR 2014 - Conference Track Proceedings","author":"Szegedy C.","year":"2014"},{"key":"cit0063","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S. & Shlens, J. (n.d.). Rethinking the Inception Architecture for Computer Vision. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 2818-2826)."},{"key":"cit0064","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC47757.2020.9049702"},{"key":"cit0065","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/543"},{"key":"cit0066","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00059"},{"journal-title":"ArXiv, February","year":"2017","author":"Xu W.","key":"cit0067"},{"key":"cit0068","first-page":"1","author":"Yang Z.","year":"2018","journal-title":"ArXiv"},{"journal-title":"ArXiv, NeurIPS","year":"2019","author":"Yu T.","key":"cit0069"},{"key":"cit0070","unstructured":"Zeiler, M. D. (n.d.). Adadelta: An Adaptive Learning Rate Method"},{"key":"cit0071","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Liu, Z. & Larson, M. (2019). Towards Large yet Imperceptible Adversarial Image Perturbations with Perceptual Color Distance. http:\/\/arxiv.org\/abs\/1911.02466","DOI":"10.1109\/CVPR42600.2020.00112"},{"key":"cit0072","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00168"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2022.2088429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T05:12:25Z","timestamp":1694754745000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2022.2088429"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,1]]},"references-count":72,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,11,2]]}},"alternative-id":["10.1080\/19393555.2022.2088429"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2022.2088429","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"type":"print","value":"1939-3555"},{"type":"electronic","value":"1939-3547"}],"subject":[],"published":{"date-parts":[[2022,7,1]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-07-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}