{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:35:04Z","timestamp":1762868104651,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/icassp40776.2020.9052913","type":"proceedings-article","created":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T20:21:13Z","timestamp":1586463673000},"page":"3097-3101","source":"Crossref","is-referenced-by-count":13,"title":["Detection of Adversarial Attacks and Characterization of Adversarial Subspace"],"prefix":"10.1109","author":[{"given":"Mohammad","family":"Esmaeilpour","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Cardinal","sequence":"additional","affiliation":[]},{"given":"Alessandro Lameiras","family":"Koerich","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Characterizing adversarial subspaces using local intrinsic dimensionality","author":"ma","year":"2018","journal-title":"arXiv preprint arXiv 1801 02929"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140444"},{"key":"ref12","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","author":"athalye","year":"2018","journal-title":"arXiv preprint arXiv 1802 00420"},{"journal-title":"Matrix Computations","year":"1983","author":"van loan","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.58"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2806390"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2655045"},{"key":"ref17","first-page":"2825","article-title":"Scikit-learn: Machine Learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref18","article-title":"Adversarial examples in the physical world","author":"kurakin","year":"2016","journal-title":"arXiv preprint arXiv 1607 02533"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref4","article-title":"Cross-representation transferability of adversarial attacks: From spectrograms to audio waveforms","author":"koerich","year":"2019","journal-title":"arXiv preprint arXiv 1910 10106"},{"key":"ref3","article-title":"A robust approach for securing audio classification against adversarial attacks","author":"esmaeilpour","year":"2019","journal-title":"arXiv preprint arXiv 1904 12848"},{"key":"ref6","article-title":"Detecting adversarial samples from artifacts","author":"feinman","year":"2017","journal-title":"arXiv preprint arXiv 1703 00410"},{"key":"ref5","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"arXiv preprint arXiv 1412 6572"},{"key":"ref8","article-title":"On detecting adversarial perturbations","author":"metzen","year":"2017","journal-title":"arXiv preprint arXiv 1702 04710"},{"key":"ref7","article-title":"On the (statistical) detection of adversarial examples","author":"grosse","year":"2017","journal-title":"arXiv preprint arXiv 1702 06280"},{"key":"ref2","article-title":"Unsupervised feature learning for environmental sound classification using cycle consistent generative adversarial network","author":"esmaeilpour","year":"2019","journal-title":"arXiv preprint arXiv 1904 01870"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.250"},{"key":"ref9","article-title":"Curtail: Characterizing and thwarting adversarial deep learning","author":"rouhani","year":"2017","journal-title":"arXiv preprint arXiv 1709 02505"},{"key":"ref20","article-title":"Delving into transferable adversarial examples and black-box attacks","author":"liu","year":"2016","journal-title":"arXiv preprint arXiv 1611 02770"},{"key":"ref22","first-page":"870","article-title":"Adversarial label flips attack on support vector machines","author":"xiao","year":"2012","journal-title":"ECAI"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref23","first-page":"387","article-title":"Evasion attacks against machine learning at test time","author":"biggio","year":"2013","journal-title":"Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases"}],"event":{"name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2020,5,4]]},"location":"Barcelona, Spain","end":{"date-parts":[[2020,5,8]]}},"container-title":["ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9040208\/9052899\/09052913.pdf?arnumber=9052913","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:28:05Z","timestamp":1656376085000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9052913\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icassp40776.2020.9052913","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}