{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T01:37:23Z","timestamp":1772933843666,"version":"3.50.1"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11401018","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"7073-7380","source":"Crossref","is-referenced-by-count":0,"title":["Position Paper: An Argument for Applications of Reinforcement in Image Segmentation to Mitigate Adversarial Attacks"],"prefix":"10.1109","author":[{"given":"Ryan","family":"Marinelli","sequence":"first","affiliation":[{"name":"University of Oslo,Department of Informatics,Oslo,Norway"}]},{"given":"Markus","family":"Lammle","sequence":"additional","affiliation":[{"name":"Upstate University,Neuroscience Program,Syracuse,New York"}]},{"given":"Robert Andrew","family":"Chetwyn","sequence":"additional","affiliation":[{"name":"University of Oslo,Department of Informatics,Oslo,Norway"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"American College of Radiology. About radiology"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.acra.2015.05.007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1177\/0956797613479386"},{"key":"ref4","article-title":"Reinforcement Learning: An Introduction","volume-title":"2nd ed. Cambridge","author":"Sutton","year":"2018"},{"key":"ref5","volume-title":"MONAI Project. Mayo clinic: Imaging ai case study"},{"key":"ref6","volume-title":"DICOM Standards Committee. Current dicom standards"},{"issue":"1","key":"ref7","doi-asserted-by":"crossref","first-page":"11654","DOI":"10.1038\/s41598-022-15245-z","article-title":"Temporal quality degradation in ai models","volume":"12","author":"Vela","year":"2022","journal-title":"Scientific Reports"},{"issue":"1","key":"ref8","first-page":"1","article-title":"Assessing the effects of data drift on the performance of machine learning models used in clinical sepsis prediction","volume":"4","author":"Finlayson","year":"2021","journal-title":"NPJ Digital Medicine"},{"key":"ref9","volume-title":"Microsoft Security. Cyberattacks against machine learning systems are more common than you think"},{"key":"ref10","volume-title":"Adversarial machine learning - industry perspectives","author":"Kumar","year":"2020"},{"key":"ref11","volume-title":"How common are adversarial attacks on ai?","author":"Dash"},{"key":"ref12","volume-title":"Poisoning webscale training datasets is practical","author":"Carlini","year":"2023"},{"key":"ref13","article-title":"Exposing vulnerabilities in clinical 11 ms through data poisoning attacks: Case study in breast cancer","volume-title":"medRxiv","author":"Das","year":"2024"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.47852\/bonviewJCBAR42024067"},{"key":"ref15","volume-title":"From imagenet to image classification: Contextualizing progress on benchmarks","author":"Tsipras","year":"2020"},{"key":"ref16","volume-title":"Pervasive label errors in test sets destabilize machine learning benchmarks","author":"Northcutt","year":"2021"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1186\/s12880-022-00793-7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2006.246725"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2013.2252431"},{"key":"ref21","first-page":"234","article-title":"U-net: Convolutional networks for biomedical image segmentation","author":"Ronneberger","year":"2015","journal-title":"in Medical Image Computing and Computer-Assisted Intervention (MICCAI)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2022.3195705"},{"key":"ref23","first-page":"5998","article-title":"Attention is all you need","volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS)","author":"Vaswani","year":"2017"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.70393\/6a69656173.323234","article-title":"Advances in deep reinforcement learning for computer vision applications","volume-title":"Journal of Industrial Engineering and Applied Science","author":"Li","year":"2024"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3018981.3018986"},{"key":"ref26","volume-title":"Internet brain segmentation repository (ibsr)"},{"key":"ref27","article-title":"Policy networks - custom policy guide","volume-title":"Stable-Baselines3 Documentation","author":"Raffin","year":"2025"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/395915"},{"key":"ref29","volume-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2015"},{"key":"ref30","article-title":"Institute of Risk Management, A Risk Practitioners Guide to ISO 31000: 2018","volume-title":"London, UK:Institute of Risk Management","year":"2018"},{"key":"ref31","volume-title":"Reinforcement Learning - Technique D3A-RL d3fend.mitre.org"},{"key":"ref32","volume-title":"Toward a knowledge graph of cybersecurity countermeasures","author":"Kaloroumakis","year":"2021"},{"key":"ref33","article-title":"MITRE","journal-title":"Semantic D3FEND Mappings to NIST 800\u201353 - MITRE D3FEND \u2014 d3fend.mitre.org"},{"key":"ref34","volume-title":"Security and privacy controls for information systems and organizations","author":"Force","year":"2020"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref36","article-title":"Explaining rl decisions with trajectories","volume-title":"Proceedings of the International Conference on Learning Representations (ICLR)","author":"Deshmukh","year":"2023"},{"key":"ref37","doi-asserted-by":"crossref","DOI":"10.64434\/tml.20250929","volume-title":"Lora without regret","author":"Schulman","year":"2025"},{"key":"ref38","article-title":"Financial Times","journal-title":"Ai and the r&d revolution: How can this fastchanging technology help providers update products more efficiently and successfully at each stage of r&d"},{"key":"ref39","article-title":"Food and Drug Administration, Proposed regulatory framework for modifications to artificial intelligence\/machine learning (ai\/ml)based software as a medical device (samd) - discussion paper and request for feedback","volume-title":"Food and Drug Administration, Tech. Rep.","year":"2025"},{"key":"ref40","volume-title":"Pma approval rate has jumped since fda changed panel meetings","author":"Taylor"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11401018.pdf?arnumber=11401018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T06:53:19Z","timestamp":1772866399000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11401018\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11401018","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}