{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:07:57Z","timestamp":1730203677676,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T00:00:00Z","timestamp":1673136000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T00:00:00Z","timestamp":1673136000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,8]]},"DOI":"10.1109\/ccnc51644.2023.10060644","type":"proceedings-article","created":{"date-parts":[[2023,3,17]],"date-time":"2023-03-17T13:17:55Z","timestamp":1679059075000},"page":"275-280","source":"Crossref","is-referenced-by-count":1,"title":["A Generative Adversarial Network-based Attack for Audio-based Condition Monitoring Systems"],"prefix":"10.1109","author":[{"given":"Abdul Rahman","family":"Ba Nabila","sequence":"first","affiliation":[{"name":"Technology Innovation Institute (TII),Secure Systems Research Center,Abu Dhabi,United Arab Emirates"}]},{"given":"Eduardo K.","family":"Viegas","sequence":"additional","affiliation":[{"name":"Technology Innovation Institute (TII),Secure Systems Research Center,Abu Dhabi,United Arab Emirates"}]},{"given":"Abdelrahman","family":"Almahmoud","sequence":"additional","affiliation":[{"name":"Technology Innovation Institute (TII),Secure Systems Research Center,Abu Dhabi,United Arab Emirates"}]},{"given":"Willian T.","family":"Lunardi","sequence":"additional","affiliation":[{"name":"Technology Innovation Institute (TII),Secure Systems Research Center,Abu Dhabi,United Arab Emirates"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"journal-title":"Practical hidden voice attacks against speech and speaker recognition systems","year":"2019","author":"abdullah","key":"ref12"},{"journal-title":"Explaining and Harnessing Adversarial Examples","year":"2014","author":"goodfellow","key":"ref15"},{"journal-title":"Did you hear that? adversarial examples against automatic speech recognition","year":"2018","author":"alzantot","key":"ref14"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766353"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3351018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2021.108325"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1115\/ESDA2004-58216"},{"journal-title":"Arcade Adversarially regularized convolutional autoencoder for network anomaly detection","year":"2022","author":"lunardi","key":"ref17"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-845"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-3087"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3159842"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500657"},{"key":"ref4","article-title":"Generative adversarial nets","volume":"27","author":"goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.06.060"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3207094"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00775"}],"event":{"name":"2023 IEEE 20th Consumer Communications & Networking Conference (CCNC)","start":{"date-parts":[[2023,1,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2023,1,11]]}},"container-title":["2023 IEEE 20th Consumer Communications &amp; Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10059462\/10059600\/10060644.pdf?arnumber=10060644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,10]],"date-time":"2023-04-10T14:51:10Z","timestamp":1681138270000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10060644\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,8]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ccnc51644.2023.10060644","relation":{},"subject":[],"published":{"date-parts":[[2023,1,8]]}}}