{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T16:49:03Z","timestamp":1756572543345,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/ccst.2018.8585591","type":"proceedings-article","created":{"date-parts":[[2018,12,24]],"date-time":"2018-12-24T18:55:13Z","timestamp":1545677713000},"page":"1-5","source":"Crossref","is-referenced-by-count":9,"title":["Adversarial Examples Detection Using No-Reference Image Quality Features"],"prefix":"10.1109","author":[{"given":"Zahid","family":"Akhtar","sequence":"first","affiliation":[]},{"given":"Joao","family":"Monteiro","sequence":"additional","affiliation":[]},{"given":"Tiago H.","family":"Falk","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2011.6190099"},{"key":"ref11","first-page":"838","article-title":"No-Reference Quality Assessment of Contrast-Distorted Images Based on Natural Scene Statistics","volume":"22","author":"fang","year":"2015","journal-title":"SPL"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288070"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s10851-015-0560-5","article-title":"No-reference image quality assessment and blind deblurring with sharpness metrics exploiting Fourier phase information","volume":"52","author":"blanchet","year":"2015","journal-title":"Journal of Mathematical Imaging and Vision"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2191563"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2147325"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2015.10.005"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.133"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2014.02.004"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.854492"},{"key":"ref4","first-page":"1","author":"feinman","year":"2017","journal-title":"Detecting adversarial samples from artifacts"},{"journal-title":"Defense-GAN Protecting classifiers against adversarial attacks using generative models","year":"2018","author":"samangouei","key":"ref3"},{"key":"ref6","first-page":"1","author":"metzen","year":"2017","journal-title":"On detecting adversarial perturbations"},{"key":"ref5","first-page":"1","author":"xu","year":"2017","journal-title":"Feature squeezing Detecting adversarial examples in deep neural networks"},{"key":"ref8","first-page":"1","author":"kurakin","year":"2016","journal-title":"Adversarial examples in the physical world"},{"key":"ref7","first-page":"1","author":"grosse","year":"2017","journal-title":"On the (statistical) detection of adversarial examples"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"journal-title":"Explaining and Harnessing Adversarial Examples","year":"2014","author":"goodfellow","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"journal-title":"Foolbox v0 8 0 A Python toolbox to benchmark the robustness of machine learning models","year":"2017","author":"rauber","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref21","first-page":"1","author":"simonyan","year":"2015","journal-title":"Very Deep Convolutional Networks for Large-scale Image Recognition"},{"key":"ref24","article-title":"Generalizable Adversarial Examples Detection Using Decisions Mismatch","author":"monteiro","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref23","first-page":"1","author":"bagnall","year":"2017","journal-title":"Training Ensembles to Detect Adversarial Examples"}],"event":{"name":"2018 International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2018,10,22]]},"location":"Montreal, QC","end":{"date-parts":[[2018,10,25]]}},"container-title":["2018 International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8573569\/8585426\/08585591.pdf?arnumber=8585591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T22:54:42Z","timestamp":1643237682000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8585591\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ccst.2018.8585591","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}