{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T02:12:26Z","timestamp":1773195146818,"version":"3.50.1"},"reference-count":57,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,12]]},"DOI":"10.1109\/cogmi67134.2025.00018","type":"proceedings-article","created":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:55:35Z","timestamp":1773086135000},"page":"75-85","source":"Crossref","is-referenced-by-count":0,"title":["Restricted Hopfield Networks are Resilient to Adversarial Perturbations"],"prefix":"10.1109","author":[{"given":"Ci","family":"Lin","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Computer Science University of Ottawa"}]},{"given":"Tet","family":"Yeap","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science University of Ottawa"}]},{"given":"Iluju","family":"Kiringa","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science University of Ottawa"}]},{"given":"Biwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science University of Ottawa"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.79.8.2554.PMC346238.PMID6953413"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.81.10.3088"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/BF00339943"},{"key":"ref4","article-title":"Dense associative memory for pattern recognition","volume":"29","author":"Krotov","year":"2016","journal-title":"Advances in neural information processing systems"},{"key":"ref5","article-title":"Large associative memory problem in neurobiology and machine learning","author":"Krotov","year":"2020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1162\/neco_a_01143"},{"key":"ref7","article-title":"Hopfield networks is all you need","author":"Ramsauer","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.bandc.2015.11.003"},{"key":"ref9","first-page":"3874","article-title":"Associative memories via predictive coding","volume":"34","author":"Salvatori","year":"2021","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref10","article-title":"Robust graph representation learning via predictive coding","author":"Byiringiro","year":"2022"},{"key":"ref11","article-title":"Brain-inspired predictive coding dynamics improve the robustness of deep neural networks","volume-title":"Neurips 2020 workshop svrhm","author":"Choksi"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.34257\/GJREFVOL21IS2PG1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI62512.2024.00110"},{"key":"ref14","article-title":"Beyond gradient: Subspace rotation algorithm","author":"Lin","journal-title":"Authorea Preprints."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057069"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1987.1057328"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC58899.2023.00033"},{"key":"ref18","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref21","first-page":"5025","article-title":"Adversarial risk and the dangers of evaluating against weak attacks","volume-title":"International conference on machine learning","author":"Uesato"},{"key":"ref22","article-title":"An enhanced learning for restricted hopfield networks","volume-title":"Master\u2019s thesis","author":"Halabian","year":"2021"},{"key":"ref23","article-title":"Global optimization techniques based on swarm-intelligent and gradient-free algorithms","volume-title":"Master\u2019s thesis","author":"Li","year":"2021"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-020-01242-z"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322472"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.23919\/CYCON.2019.8756865"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3691625"},{"key":"ref28","article-title":"Analysis of Complex Dynamical Systems by Combining Recurrent Neural Networks and Mechanistic Models","volume-title":"PhD thesis","author":"Lin","year":"2024"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.21428\/594757db.daad1be1","article-title":"Stacked Bidirectional LSTM for Predicting Emission of Nitrous Oxide","volume-title":"Proceedings of the Canadian Conference on Artificial Intelligence","author":"Lin"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3696113"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289451"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-7687.2004.00331.x"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1992.227008"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(99)00038-6"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1088\/0305-4470\/21\/1\/030"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1088\/0305-4470\/21\/1\/031"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.10.058"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1010719"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1011280"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/a15080283"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/591"},{"key":"ref42","article-title":"Opportunities and challenges in deep learning adversarial robustness: A survey","author":"Silva","year":"2020"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref45","first-page":"274","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","volume-title":"International conference on machine learning","author":"Athalye"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683348"},{"key":"ref47","article-title":"Theoretical evidence for adversarial robustness through randomization","volume":"32","author":"Pinot","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746293"},{"key":"ref49","article-title":"Certified defenses for data poisoning attacks","volume":"30","author":"Steinhardt","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01304"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00444"},{"key":"ref52","article-title":"Skip connections matter: On the transferability of adversarial examples generated with resnets","author":"Wu","year":"2020"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00496"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23198"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01258-8_32"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3137084"},{"key":"ref57","article-title":"Bypassing feature squeezing by increasing adversary strength","author":"Sharma","year":"2018"}],"event":{"name":"2025 IEEE 7th International Conference on Cognitive Machine Intelligence (CogMI)","location":"Pittsburgh, PA, USA","start":{"date-parts":[[2025,11,12]]},"end":{"date-parts":[[2025,11,14]]}},"container-title":["2025 IEEE 7th International Conference on Cognitive Machine Intelligence (CogMI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11417011\/11416503\/11417059.pdf?arnumber=11417059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T05:31:21Z","timestamp":1773120681000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11417059\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/cogmi67134.2025.00018","relation":{},"subject":[],"published":{"date-parts":[[2025,11,12]]}}}