{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T04:40:31Z","timestamp":1742532031214,"version":"3.40.1"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T00:00:00Z","timestamp":1739836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T00:00:00Z","timestamp":1739836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,2,18]]},"DOI":"10.1109\/icaiic64266.2025.10920873","type":"proceedings-article","created":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T18:08:03Z","timestamp":1742407683000},"page":"0270-0275","source":"Crossref","is-referenced-by-count":0,"title":["Defending Against High-Intensity Adversarial Perturbations in Deep Neural Networks: A Robust Swin Transformer Approach"],"prefix":"10.1109","author":[{"given":"Quang","family":"Le","sequence":"first","affiliation":[{"name":"University of Ottawa"}]},{"given":"Francois","family":"Chan","sequence":"additional","affiliation":[{"name":"Royal Military College"}]},{"given":"Jianbing","family":"Ni","sequence":"additional","affiliation":[{"name":"Queen&#x0027;s University"}]},{"given":"Scott","family":"Yam","sequence":"additional","affiliation":[{"name":"Queen&#x0027;s University"}]},{"given":"Ning","family":"Lu","sequence":"additional","affiliation":[{"name":"Queen&#x0027;s University"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100270"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/sym13030428"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3319492"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-023-04532-5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW60793.2023.00395"},{"key":"ref6","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv preprint"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.2021.2006781"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892966"},{"key":"ref10","first-page":"7472","article-title":"Theoretically principled trade-off between robustness and accuracy","volume-title":"International conference on machine learning","author":"Zhang","year":"2019"},{"article-title":"Improving adversarial robustness requires revisiting misclassified examples","volume-title":"International conference on learning representations, 2019","author":"Wang","key":"ref11"},{"key":"ref12","article-title":"Latent feature relation consistency for adversarial robustness","author":"Liu","year":"2023","journal-title":"arXiv preprint"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00059"},{"key":"ref14","article-title":"Adversarial examples are not bugs, they are features","volume":"32","author":"Ilyas","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref15","first-page":"17 148","article-title":"Distilling robust and non-robust features in adversarial examples by information bottleneck","volume":"34","author":"Kim","year":"2021","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00791"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01170"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"}],"event":{"name":"2025 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","start":{"date-parts":[[2025,2,18]]},"location":"Fukuoka, Japan","end":{"date-parts":[[2025,2,21]]}},"container-title":["2025 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10919472\/10920631\/10920873.pdf?arnumber=10920873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T04:27:57Z","timestamp":1742531277000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10920873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,18]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icaiic64266.2025.10920873","relation":{},"subject":[],"published":{"date-parts":[[2025,2,18]]}}}