{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T08:48:44Z","timestamp":1747385324861,"version":"3.37.3"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN-2018-05911"],"award-info":[{"award-number":["RGPIN-2018-05911"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3339542","type":"journal-article","created":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T18:25:42Z","timestamp":1701800742000},"page":"138303-138315","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Semi-Supervised Adversarially Learned Meta-Classifier for Detecting Neural Trojan Attacks"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9905-7530","authenticated-orcid":false,"given":"Shahram","family":"Ghahremani","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, York University, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8574-3537","authenticated-orcid":false,"given":"Amir Jalaly","family":"Bidgoly","sequence":"additional","affiliation":[{"name":"Department of Information Technology and Computer Engineering, University of Qom, Qom, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4860-3551","authenticated-orcid":false,"given":"Uyen Trang","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, York University, Toronto, Canada"}]},{"given":"David K. Y.","family":"Yau","sequence":"additional","affiliation":[{"name":"Information Systems Technology and Design Pillar, Singapore University of Technology and Design, Tampines, Singapore"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVIDL51233.2020.00008"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BigComp48618.2020.00-23"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.19101\/IJACR.2021.1152001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15805-z"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm51999.2021.9632305"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTAsia49270.2021.9715557"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243792"},{"key":"ref8","article-title":"A Berkeley view of systems challenges for AI","author":"Stoica","year":"2017","journal-title":"arXiv:1712.05855"},{"key":"ref9","article-title":"FreeEagle: Detecting complex neural trojans in data-free cases","author":"Fu","year":"2023","journal-title":"arXiv:2302.14500"},{"volume-title":"Models\u2014Hugging Face","year":"2023","key":"ref10"},{"volume-title":"Summer 2018 Release BigML.com","year":"2018","key":"ref11"},{"volume-title":"AWS Marketplace: Homepage","year":"2023","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243757"},{"key":"ref15","first-page":"1","article-title":"Identifying vulnerabilities in the machine learning model supply chain","volume-title":"Proc. Neural Inf. Process. Symp. Workshop Mach. Learn. Secur. (MLSec)","author":"Gu"},{"key":"ref16","article-title":"BadNets: Identifying vulnerabilities in the machine learning model supply chain","author":"Gu","year":"2017","journal-title":"arXiv:1708.06733"},{"key":"ref17","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"Chen","year":"2017","journal-title":"arXiv:1712.05526"},{"volume-title":"IARPA\u2014TrojAI","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SPW50608.2020.00025"},{"key":"ref21","article-title":"Spectral signatures in backdoor attacks","author":"Tran","year":"2018","journal-title":"arXiv:1811.00636"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/647"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/sp40001.2021.00034"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23415"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363216"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00038"},{"key":"ref27","article-title":"Detecting backdoor attacks on deep neural networks by activation clustering","author":"Chen","year":"2018","journal-title":"arXiv:1811.03728"},{"key":"ref28","first-page":"1541","article-title":"Demon in the variant: Statistical analysis of DNNs for robust backdoor contamination detection","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Tang"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427264"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359790"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_14"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00356"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"key":"ref34","article-title":"Speech commands: A dataset for limited-vocabulary speech recognition","author":"Warden","year":"2018","journal-title":"arXiv:1804.03209"},{"key":"ref35","first-page":"139","article-title":"One-class SVMs for document classification","volume":"2","author":"Manevitz","year":"2001","journal-title":"J. Mach. Learn. Res."},{"volume-title":"Popular Datasets Over Time","key":"ref36"},{"volume-title":"Learning multiple layers of features from tiny images","year":"2009","author":"Krizhevsky","key":"ref37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1177\/0278364904045481"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10342856.pdf?arnumber=10342856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T01:16:13Z","timestamp":1705022173000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10342856\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3339542","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2023]]}}}