{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:22:03Z","timestamp":1760710923659,"version":"3.37.3"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,23]]},"DOI":"10.1109\/icassp43922.2022.9746138","type":"proceedings-article","created":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T19:50:34Z","timestamp":1651089034000},"page":"3293-3297","source":"Crossref","is-referenced-by-count":4,"title":["Combating False Sense of Security: Breaking the Defense of Adversarial Training Via Non-Gradient Adversarial Attack"],"prefix":"10.1109","author":[{"given":"Mingyuan","family":"Fan","sequence":"first","affiliation":[{"name":"Fuzhou University,College of Computer and Data Science,China"}]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Xidian University,School of Cyber Engineering,China"}]},{"given":"Cen","family":"Chen","sequence":"additional","affiliation":[{"name":"East China Normal University,School of Data Science and Engineering,China"}]},{"given":"Shengxing","family":"Yu","sequence":"additional","affiliation":[{"name":"Peking University,School of Electronics Engineering and Computer Science,China"}]},{"given":"Wenzhong","family":"Guo","sequence":"additional","affiliation":[{"name":"Fuzhou University,College of Computer and Data Science,China"}]},{"given":"Ximeng","family":"Liu","sequence":"additional","affiliation":[{"name":"Fuzhou University,College of Computer and Data Science,China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01029"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412130"},{"article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","year":"2018","author":"athalye","key":"ref13"},{"key":"ref14","article-title":"Is ami (attacks meet interpretability) robust to adversarial examples?","author":"carlini","year":"2019","journal-title":"arXiv preprint arXiv 1902 05023"},{"key":"ref15","article-title":"Evaluating and understanding the robustness of adversarial logit pairing","author":"engstrom","year":"2018","journal-title":"arXiv preprint arXiv 1807 10272"},{"key":"ref16","first-page":"284","article-title":"Synthesizing robust adversarial examples","author":"athalye","year":"2018","journal-title":"International Conference on Machine Learning"},{"key":"ref17","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"Computer Science"},{"article-title":"Adversarial examples in the physical world","year":"2016","author":"kurakin","key":"ref18"},{"article-title":"Towards deep learning models resistant to adversarial attacks","year":"2017","author":"madry","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2018.8301638"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2017.7989385"},{"key":"ref6","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"Computer Science"},{"key":"ref5","article-title":"A survey on deep learning in medical image analysis","author":"geert","year":"2017","journal-title":"Medical Image Analysis"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"10033","DOI":"10.1609\/aaai.v35i11.17204","article-title":"Pid-based approach to adversarial attacks","volume":"35","author":"wan","year":"2021","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904720"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467386"},{"key":"ref1","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"NIPS"},{"article-title":"Towards deep learning models resistant to adversarial attacks","year":"2017","author":"madry","key":"ref20"},{"article-title":"Fast is better than free: Revisiting adversarial training","year":"2020","author":"wong","key":"ref22"},{"key":"ref21","article-title":"Adversarial training for free!","author":"shafahi","year":"2019","journal-title":"arXiv preprint arXiv 1904 12848"},{"key":"ref24","first-page":"4","article-title":"The curse of dimensionality","volume":"1","author":"k\u00f6ppen","year":"2000","journal-title":"5th Online World Conference on Soft Computing in Industrial Applications (WSC5)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(00)00009-5"},{"key":"ref25","article-title":"Snapshot ensembles: Train 1, get m for free","author":"huang","year":"2017","journal-title":"arXiv preprint arXiv 1704 00109"}],"event":{"name":"ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2022,5,23]]},"location":"Singapore, Singapore","end":{"date-parts":[[2022,5,27]]}},"container-title":["ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9745891\/9746004\/09746138.pdf?arnumber=9746138","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T03:20:31Z","timestamp":1727061631000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9746138\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,23]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icassp43922.2022.9746138","relation":{},"subject":[],"published":{"date-parts":[[2022,5,23]]}}}