{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T12:31:32Z","timestamp":1754483492092,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/ic3.2017.8284294","type":"proceedings-article","created":{"date-parts":[[2018,2,8]],"date-time":"2018-02-08T21:49:18Z","timestamp":1518126558000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Adversarial attacks on computer vision algorithms using natural perturbations"],"prefix":"10.1109","author":[{"given":"Arvind","family":"Ramanathan","sequence":"first","affiliation":[]},{"given":"Laura","family":"Pullum","sequence":"additional","affiliation":[]},{"given":"Zubir","family":"Husein","sequence":"additional","affiliation":[]},{"given":"Sunny","family":"Raj","sequence":"additional","affiliation":[]},{"given":"Neslisah","family":"Torosdagli","sequence":"additional","affiliation":[]},{"given":"Sumanta","family":"Pattanaik","sequence":"additional","affiliation":[]},{"given":"Sumit K.","family":"Jha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Adversarial examples in the physical world","year":"2016","author":"kurakin","key":"ref10"},{"journal-title":"Unit-testing statistical software","year":"2011","author":"pacula","key":"ref11"},{"journal-title":"Testing mcmc code","year":"2014","author":"grosse","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24756-2_1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69850-0_8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02658-4_32"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"ref17","first-page":"5","article-title":"Formal hardware verification methods: A survey","author":"gupta","year":"1993","journal-title":"Computer-Aided Verification"},{"journal-title":"Model checking","year":"1999","author":"clarke","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72522-0_6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"journal-title":"Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples","year":"2016","author":"papernot","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/nature13570"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1007\/BF00047572","article-title":"Simulated annealing: theory and applications","volume":"12","author":"hwang","year":"1988","journal-title":"Acta Applicandae Mathematicae"},{"journal-title":"Computer Vision with the OpenCV Library","year":"2008","author":"bradski","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"journal-title":"Explaining and Harnessing Adversarial Examples","year":"2014","author":"goodfellow","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2015.7065415"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3850\/9783981537079_0954"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721679"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.1990.113767"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/BF01009452"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16612-9_11"},{"journal-title":"Simulated Annealing and Boltzmann Machines","year":"1988","author":"aarts","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6940-7_10"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/325165.325247"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1964921.1964935"}],"event":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","start":{"date-parts":[[2017,8,10]]},"location":"Noida","end":{"date-parts":[[2017,8,12]]}},"container-title":["2017 Tenth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8277262\/8284279\/08284294.pdf?arnumber=8284294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T03:10:10Z","timestamp":1660446610000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8284294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ic3.2017.8284294","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}