{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:42:47Z","timestamp":1730202167761,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/case48305.2020.9216839","type":"proceedings-article","created":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T20:01:51Z","timestamp":1602187311000},"page":"1343-1348","source":"Crossref","is-referenced-by-count":2,"title":["Training Artificial Neural Networks by Generalized Likelihood Ratio Method: An Effective Way to Improve Robustness"],"prefix":"10.1109","author":[{"given":"Li","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Yijie","family":"Peng","sequence":"additional","affiliation":[]},{"given":"L. Jeff","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Zewu","family":"Ke","sequence":"additional","affiliation":[]},{"given":"Shuhuai","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Imagenet classification with deep convolutional neural networks","year":"2012","author":"krizhevsky","key":"ref30"},{"key":"ref10","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"International Conference on Learning Representations"},{"key":"ref11","article-title":"Explaining and harnessing adversarial examples","volume":"preprint arxiv 1412 6572","author":"goodfellow","year":"2014","journal-title":"ArXiv"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref13","first-page":"2574","article-title":"Deepfool: a simple and accurate method to fool deep neural networks","author":"seyed-mohsen moosavi-dezfooli","year":"2016","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref14","article-title":"Measuring neural net robustness with constraints","author":"bastani","year":"2016","journal-title":"NeurIPS"},{"key":"ref15","article-title":"Adversarial examples that fool both human and computer vision","volume":"abs 1802 8195","author":"elsayed","year":"2018","journal-title":"CoRR"},{"journal-title":"Theoretical Neuroscience","year":"2018","author":"dayan","key":"ref16"},{"journal-title":"The Organization of Behavior","year":"1949","author":"hebb","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/BF02478259"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-69033-9"},{"journal-title":"Stochastic Approximation and Recursive Algorithms and Applications","year":"2003","author":"kushner","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2016.17216"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1287\/moor.1090.0422"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/nature16961"},{"key":"ref6","article-title":"Benchmarking neural network robustness to common corruptions and perturbations","volume":"abs 1807 1697","author":"hendrycks","year":"2018","journal-title":"CoRR"},{"key":"ref29","volume":"3","author":"haykin","year":"2009","journal-title":"Neural networks and learning machines Pearson Education Upper Saddle River"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/nature21056"},{"key":"ref8","article-title":"Why do deep convolutional networks generalize so poorly to small image transformations?","volume":"abs 1805 12177","author":"azulay","year":"2018","journal-title":"CoRR"},{"key":"ref7","article-title":"Do CIFAR-10 classifiers generalize to cifar-10?","volume":"abs 1806 451","author":"recht","year":"2018","journal-title":"CoRR"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"6645","DOI":"10.1109\/ICASSP.2013.6638947","article-title":"Speech recognition with deep recurrent neural networks","author":"graves","year":"2013","journal-title":"2013 IEEE International Conference on Acoustics Speech and Signal Processing"},{"key":"ref9","article-title":"Using trusted data to train deep networks on labels corrupted by severe noise","author":"dan","year":"2018","journal-title":"NeurIPS"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-1384-8_5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4024-3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2017.1674"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1080.0531"},{"journal-title":"Gradient Estimation via Perturbation Analysis","year":"1991","author":"glasserman","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-1449-3"},{"journal-title":"Discrete Event Systems Sensitivity Analysis and Stochastic Optimization by the Score Function Method","year":"1993","author":"rubinstein","key":"ref25"}],"event":{"name":"2020 IEEE 16th International Conference on Automation Science and Engineering (CASE)","start":{"date-parts":[[2020,8,20]]},"location":"Hong Kong, Hong Kong","end":{"date-parts":[[2020,8,21]]}},"container-title":["2020 IEEE 16th International Conference on Automation Science and Engineering (CASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9210430\/9216730\/09216839.pdf?arnumber=9216839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:46:36Z","timestamp":1656344796000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9216839\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/case48305.2020.9216839","relation":{},"subject":[],"published":{"date-parts":[[2020,8]]}}}