{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:21:07Z","timestamp":1737436867196,"version":"3.33.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T00:00:00Z","timestamp":1734307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T00:00:00Z","timestamp":1734307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,16]]},"DOI":"10.1109\/asianhost63913.2024.10838479","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:35:25Z","timestamp":1737052525000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["A Black-Box Targeted Misclassification Attack on Edge AI with Adversarial Examples Generated from RAW Image Sensor Data"],"prefix":"10.1109","author":[{"given":"Bowen","family":"Hu","sequence":"first","affiliation":[{"name":"School of Electrical and Electronic Engineering, Nanyang Technological University,Singapore"}]},{"given":"Weiyang","family":"He","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, Nanyang Technological University,Singapore"}]},{"given":"Kuo","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, Nanyang Technological University,Singapore"}]},{"given":"Chip-Hong","family":"Chang","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, Nanyang Technological University,Singapore"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983149"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-018-0316-z"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2918951"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3474376.3487287"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SOCC56010.2022.9908112"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/430"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/430"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref14","first-page":"284","article-title":"Synthesizing robust adversarial examples","volume-title":"International conference on machine learning","author":"Athalye","year":"2018"},{"key":"ref15","first-page":"3896","article-title":"Adversarial camera stickers: A physical camera-based attack on deep learning systems","volume-title":"International conference on machine learning","author":"Li","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01498"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01580"},{"key":"ref18","article-title":"Intriguing properties of neural networks","volume-title":"2nd International Conference on Learning Representations, ICLR 2014 - Conference Track Proceedings","author":"Szegedy","year":"2013"},{"key":"ref19","article-title":"Explaining and harnessing adversarial examples","volume-title":"3rd International Conference on Learning Representations, ICLR 2015 - Conference Track Proceedings","author":"Goodfellow","year":"2015"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00108"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01491"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00411"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2019.00015"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3278519"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/dac18072.2020.9218577"},{"volume-title":"Raspberry Pi Camera Algorithm and Tuning Guide","year":"2023","author":"Foundation","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN54540.2023.10191087"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2012.02.016"}],"event":{"name":"2024 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","start":{"date-parts":[[2024,12,16]]},"location":"Kobe, Japan","end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10838388\/10838389\/10838479.pdf?arnumber=10838479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:40:23Z","timestamp":1737398423000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10838479\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,16]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/asianhost63913.2024.10838479","relation":{},"subject":[],"published":{"date-parts":[[2024,12,16]]}}}