{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T07:57:41Z","timestamp":1772524661976,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Educational Research Projects for Young and Middle-Aged Teachers in Fujian","award":["JAT190330"],"award-info":[{"award-number":["JAT190330"]}]},{"name":"Educational Research Projects for Young and Middle-Aged Teachers in Fujian","award":["JAT190319"],"award-info":[{"award-number":["JAT190319"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3467154","type":"journal-article","created":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T19:27:41Z","timestamp":1727292461000},"page":"146441-146452","source":"Crossref","is-referenced-by-count":2,"title":["Adversarial Defense Based on Denoising Convolutional Autoencoder in EEG-Based Brain\u2013Computer Interfaces"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-0411-7931","authenticated-orcid":false,"given":"Yongting","family":"Ding","sequence":"first","affiliation":[{"name":"School of Science, Jimei University, Xiamen, China"}]},{"given":"Lin","family":"Li","sequence":"additional","affiliation":[{"name":"Computer Engineering College, Jimei University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3331-9515","authenticated-orcid":false,"given":"Qingyan","family":"Li","sequence":"additional","affiliation":[{"name":"School of Science, Jimei University, Xiamen, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1388-2457(02)00057-3"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3097307"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s120201211"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/nature11076"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/s41593-019-0488-y"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/nature10489"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2956018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2022.3147030"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2021.3069026"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.112036"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1049\/el.2020.2509"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.18280\/ts.380102"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4149\/BLL_2023_002"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2022.105242"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1088\/1741-2552\/aace8c"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/hbm.23730"},{"key":"ref17","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"ref19","article-title":"Adversarial perturbations against deep neural networks for malware classification","author":"Grosse","year":"2016","journal-title":"arXiv:1606.04435"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2983666"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNSRE.2019.2908955"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36708-4_39"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1093\/nsr\/nwaa233"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1088\/1741-2552\/ac0f4c"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNSRE.2023.3273214"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/RBME.2020.3013489"},{"key":"ref27","article-title":"Ensemble adversarial training: Attacks and defenses","author":"Tram\u00e8r","year":"2017","journal-title":"arXiv:1705.07204"},{"key":"ref28","article-title":"Practical black-box attacks against machine learning","author":"Papernot","year":"2016","journal-title":"arXiv:1602.02697"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref30","article-title":"Adversarial artifact detection in EEG-based brain-computer interfaces","author":"Chen","year":"2022","journal-title":"arXiv:2212.00727"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP55214.2022.9943479"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.01.028"},{"key":"ref33","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.108889"},{"key":"ref36","first-page":"7472","article-title":"Theoretically principled trade-off between robustness and accuracy","volume-title":"Proc. 36th Int. Conf. Mach. Learn. (ICML)","author":"Zhang"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1803.01442"},{"key":"ref38","article-title":"Countering adversarial images using input transformations","author":"Guo","year":"2017","journal-title":"arXiv:1711.00117"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00624"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02642-3"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2951526"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1135-2_18"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ45933.2021.9494500"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/INDISCON58499.2023.10270235"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/578295"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2012.00055"},{"key":"ref47","first-page":"2390","article-title":"Filter bank common spatial pattern (FBCSP) in brain-computer interface","volume-title":"Proc. IEEE Int. Joint Conf. Neural Netw.","author":"Keng Ang"},{"key":"ref48","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv:1412.6980"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2016.2608931"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10693464.pdf?arnumber=10693464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T17:32:34Z","timestamp":1729272754000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10693464\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3467154","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}