{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:17:13Z","timestamp":1730215033301,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T00:00:00Z","timestamp":1658448000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T00:00:00Z","timestamp":1658448000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,22]]},"DOI":"10.1109\/dsit55514.2022.9943985","type":"proceedings-article","created":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T20:39:41Z","timestamp":1668717581000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Adversarial Attack Detection Based on Example Semantics and Model Activation Features"],"prefix":"10.1109","author":[{"given":"Jinyin","family":"Chen","sequence":"first","affiliation":[{"name":"Institute of Cyberspace Security, Zhejiang University of Technology,Hangzhou,China"}]},{"given":"Tianle","family":"Yu","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Zhejiang University of Technology,Hangzhou,China"}]},{"given":"Changan","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Zhejiang University of Technology,Hangzhou,China"}]},{"given":"Haibin","family":"Zheng","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Zhejiang University of Technology,Hangzhou,China"}]},{"given":"Wenhong","family":"Zhao","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Jiaxing Nanhu University,Jiaxing,Zhejiang,China"}]},{"given":"Ling","family":"Pang","sequence":"additional","affiliation":[{"name":"Chinese National Key Laboratory of Science and Technology on Information System Security,Shijiazhuang,China"}]},{"given":"Hu","family":"Li","sequence":"additional","affiliation":[{"name":"Chinese National Key Laboratory of Science and Technology on Information System Security,Dingxi,Gansu,China"}]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"On detecting adversarial perturbations[J]","author":"metzen","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref11","first-page":"1","article-title":"Adversarial and clean data are not twins[J]","author":"gong","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref12","first-page":"1","article-title":"On the (statistical) detection of adversarial examples[J]","author":"grosse","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref13","first-page":"1","article-title":"Characterizing adversarial subspaces using local intrinsic dimensionality[J]","author":"ma","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0130140"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.4.541"},{"key":"ref16","article-title":"Learning multiple layers of features from tiny images","volume":"2","author":"krizhevsky","year":"2009","journal-title":"Computer Science Department University of Toronto Tech Rep"},{"key":"ref17","first-page":"20","article-title":"lmageNet:A Large-Scale Hierarchical Image Database","volume":"1?4","author":"deng","year":"2009","journal-title":"2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2009)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref19","article-title":"ImageNet Classification with Deep Convolutional Neural Networks[C]","author":"krizhevsky","year":"2012","journal-title":"NIPS Curran Associates Inc"},{"key":"ref4","first-page":"1","article-title":"Adversarial example defense: Ensembles of weak defenses are not strong[C]","author":"he","year":"0","journal-title":"11th USENIX Workshop on Offensive Technologies (WOOT 17)"},{"key":"ref3","first-page":"1","article-title":"Feature squeezing: Detecting adversarial examples in deep neural networks[J]","author":"xu","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref6","first-page":"1","article-title":"Detecting adversarial image examples in deep neural networks with adaptive noise reduction[J]","author":"liang","year":"2018","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref5","first-page":"1","article-title":"Robustness to adversarial examples through an ensemble of specialists[J]","author":"abbasi","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01446"},{"key":"ref2","first-page":"1","article-title":"Early methods for detecting adversarial images[J]","author":"hendrycks","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref1","first-page":"1","article-title":"A deep learning-oriented method for adversarial sample discrepancy detection[J]","author":"shu-yan","year":"2020","journal-title":"Computer Applications"},{"key":"ref9","first-page":"1","article-title":"Detecting adversarial samples from artifacts[J]","author":"feinman","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref20","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2015","journal-title":"3rd International Conference on Learning Representations ICLR 2015"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23415"}],"event":{"name":"2022 5th International Conference on Data Science and Information Technology (DSIT)","start":{"date-parts":[[2022,7,22]]},"location":"Shanghai, China","end":{"date-parts":[[2022,7,24]]}},"container-title":["2022 5th International Conference on Data Science and Information Technology (DSIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9943793\/9943812\/09943985.pdf?arnumber=9943985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T20:00:07Z","timestamp":1670875207000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9943985\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,22]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/dsit55514.2022.9943985","relation":{},"subject":[],"published":{"date-parts":[[2022,7,22]]}}}