{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:13:19Z","timestamp":1775326399168,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3457784","type":"journal-article","created":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T18:37:31Z","timestamp":1726079851000},"page":"131323-131335","source":"Crossref","is-referenced-by-count":2,"title":["Exploring the Impact of Conceptual Bottlenecks on Adversarial Robustness of Deep Neural Networks"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3874-0883","authenticated-orcid":false,"given":"Bader","family":"Rasheed","sequence":"first","affiliation":[{"name":"College of Technological Innovation, Zayed University, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7301-4313","authenticated-orcid":false,"given":"Mohamed","family":"Abdelhamid","sequence":"additional","affiliation":[{"name":"Institute of Data Science and Artificial Intelligence, Innopolis University, Innopolis, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2220-8518","authenticated-orcid":false,"given":"Adil","family":"Khan","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Hull, Kingston upon Hull, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0767-6535","authenticated-orcid":false,"given":"Igor","family":"Menezes","sequence":"additional","affiliation":[{"name":"Faculty of Business, Law and Politics, University of Hull, Kingston upon Hull, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0630-1264","authenticated-orcid":false,"given":"Asad Masood","family":"Khatak","sequence":"additional","affiliation":[{"name":"College of Technological Innovation, Zayed University, Abu Dhabi, United Arab Emirates"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv:1312.6199"},{"key":"ref2","article-title":"Concept bottleneck models","author":"Koh","year":"2020","journal-title":"arXiv:2007.04612"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/e22101081"},{"key":"ref4","article-title":"Do concept bottleneck models learn as intended?","author":"Margeloiu","year":"2021","journal-title":"arXiv:2105.04289"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/e22090999"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26765"},{"key":"ref7","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref8","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2017.49"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2016.282"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/047174882x"},{"key":"ref13","first-page":"125","article-title":"Adversarial examples are not bugs, they are features","volume-title":"Proc. Annu. Conf. Neural Inf. Process. Syst. (NeurIPS)","author":"Ilyas"},{"key":"ref14","article-title":"The caltech-UCSD birds-200-2011 dataset","author":"Wah","year":"2011"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.1700808"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2018.2886017"},{"key":"ref17","article-title":"Ensemble adversarial training: Attacks and defenses","author":"Tram\u00e8r","year":"2017","journal-title":"arXiv:1705.07204"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/iccv.2019.00487"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459250"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206594"},{"key":"ref21","article-title":"Adversarial machine learning at scale","author":"Kurakin","year":"2016","journal-title":"arXiv:1611.01236"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2784440"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2015.7133169"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00432"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.23915\/distill.00019"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1117\/12.2511964"},{"key":"ref28","first-page":"9505","article-title":"Sanity checks for saliency maps","volume-title":"Proc. Adv. NIPS","author":"Adebayo"},{"key":"ref29","article-title":"Debiasing concept-based explanations with causal analysis","author":"Bahadori","year":"2020","journal-title":"arXiv:2007.11500"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.gloenvcha.2006.03.008"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2017.243"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3547330"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1126\/science.1254933"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3600211.3604692"},{"key":"ref35","article-title":"Learning to intervene on concept bottlenecks","author":"Steinmann","year":"2023","journal-title":"arXiv:2308.13453"},{"key":"ref36","article-title":"ELUDE: Generating interpretable explanations via a decomposition into labelled and unlabelled features","author":"Ramaswamy","year":"2022","journal-title":"arXiv:2206.07690"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.015452"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/2890761"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s44196-023-00266-x"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/info14120642"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10677449.pdf?arnumber=10677449","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:44:59Z","timestamp":1727243099000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10677449\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3457784","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}