{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:18:53Z","timestamp":1740169133268,"version":"3.37.3"},"reference-count":28,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571290","61831007","61431008"],"award-info":[{"award-number":["61571290","61831007","61431008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2017YFB0802900","2018YFB0803503","2017YFB0802300"],"award-info":[{"award-number":["2017YFB0802900","2018YFB0803503","2017YFB0802300"]}]},{"DOI":"10.13039\/100017054","name":"NSFC-Zhejiang Joint Fund for the Integration of Industrialization and Informatization","doi-asserted-by":"crossref","award":["U1509219"],"award-info":[{"award-number":["U1509219"]}],"id":[{"id":"10.13039\/100017054","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Information Network Security Key Laboratory of the Ministry of Public Security Open Project Support","award":["C18611"],"award-info":[{"award-number":["C18611"]}]},{"name":"Three-Year Plan of Action for Clinical Skills and Clinical Innovation in Shanghai","award":["16CR2042B"],"award-info":[{"award-number":["16CR2042B"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2942607","type":"journal-article","created":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T19:58:26Z","timestamp":1569009506000},"page":"136812-136821","source":"Crossref","is-referenced-by-count":0,"title":["Generating Adversarial Samples With Constrained Wasserstein Distance"],"prefix":"10.1109","volume":"7","author":[{"given":"Kedi","family":"Wang","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4530-5118","authenticated-orcid":false,"given":"Ping","family":"Yi","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Futai","family":"Zou","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Yue","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Adversarial examples are not bugs, they are features","author":"ilyas","year":"2019","journal-title":"arXiv 1905 02175"},{"key":"ref11","first-page":"1","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2018","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref12","article-title":"Blocking transferability of adversarial examples in black-box learning systems","author":"hosseini","year":"2017","journal-title":"arXiv 1703 04318"},{"key":"ref13","article-title":"A boundary tilting persepective on the phenomenon of adversarial examples","author":"tanay","year":"2016","journal-title":"arXiv 1608 07690"},{"key":"ref14","first-page":"1","article-title":"Characterizing adversarial subspaces using local intrinsic dimensionality","author":"ma","year":"2018","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref15","article-title":"Detecting adversarial samples from artifacts","author":"feinman","year":"2017","journal-title":"arXiv 1703 00410"},{"key":"ref16","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"arXiv 1412 6572"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref19","first-page":"1","article-title":"Spatially transformed adversarial examples","author":"xiao","year":"2018","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref4","article-title":"POPQORN: Quantifying robustness of recurrent neural networks","author":"ko","year":"2019","journal-title":"arXiv 1905 07387"},{"key":"ref27","article-title":"Reading digits in natural images with unsupervised feature learning","author":"netzer","year":"2011","journal-title":"Proc NIPS Workshop on Deep Learning and Unsupervised Feature Learning"},{"key":"ref3","first-page":"4757","article-title":"What does it mean to learn in deep networks? And, how does one detect adversarial attacks?","author":"corneanu","year":"2019","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00099"},{"key":"ref5","first-page":"11767","article-title":"Robustness of 3D Deep Learning in an Adversarial Setting","author":"wicker","year":"2019","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref7","first-page":"4939","article-title":"Efficient neural network robustness certification with general activation functions","author":"zhang","year":"2018","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref2","article-title":"Adversarial machine learning at scale","author":"kurakin","year":"2016","journal-title":"arXiv 1611 01236"},{"key":"ref9","first-page":"2730","article-title":"Improving transferability of adversarial examples with input diversity","author":"xie","year":"2019","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"ref20","article-title":"Wasserstein adversarial examples via projected sinkhorn iterations","author":"wong","year":"2019","journal-title":"arXiv 1902 07906"},{"key":"ref22","article-title":"Feature squeezing: Detecting adversarial examples in deep neural networks","author":"xu","year":"2017","journal-title":"arXiv 1704 01155"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783405"},{"key":"ref24","volume":"338","author":"villani","year":"2008","journal-title":"Optimal Transport Old and New"},{"key":"ref23","article-title":"Wasserstein GAN","author":"arjovsky","year":"2017","journal-title":"arXiv 1701 07875"},{"article-title":"Learning multiple layers of features from tiny images","year":"2009","author":"krizhevsky","key":"ref26"},{"key":"ref25","first-page":"5769","article-title":"Improved Training of Wasserstein GANs","author":"gulrajani","year":"2017","journal-title":"Proc 31st Int Conf Neural Inf Process Syst"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08845708.pdf?arnumber=8845708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T19:45:37Z","timestamp":1662666337000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8845708\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2942607","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}