{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:21:04Z","timestamp":1725808864240},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,14]]},"DOI":"10.1109\/icassp48485.2024.10446884","type":"proceedings-article","created":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T18:56:31Z","timestamp":1710788191000},"page":"6990-6994","source":"Crossref","is-referenced-by-count":0,"title":["DeepGRE: Global Robustness Evaluation of Deep Neural Networks"],"prefix":"10.1109","author":[{"given":"Tianle","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Liverpool,UK"}]},{"given":"Jiaxu","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Liverpool,UK"}]},{"given":"Yanghao","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Liverpool,UK"}]},{"given":"Ronghui","family":"Mu","sequence":"additional","affiliation":[{"name":"University of Liverpool,UK"}]},{"given":"Wenjie","family":"Ruan","sequence":"additional","affiliation":[{"name":"University of Liverpool,UK"}]}],"member":"263","reference":[{"volume-title":"ICLR","author":"Szegedy","article-title":"Intriguing properties of neural networks","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TKDE.2013.57"},{"key":"ref3","first-page":"154","article-title":"Proa: A probabilistic robustness assessment against functional perturbations","author":"Zhang","year":"2022","journal-title":"ECML-PKDD"},{"key":"ref4","first-page":"1","article-title":"Quantifying safety risks of deep neural networks","author":"Xu","year":"2022","journal-title":"Complex & Intelligent Systems"},{"volume-title":"ICLR","author":"Kurakin","article-title":"Adversarial machine learning at scale","key":"ref5"},{"volume-title":"CoRR","author":"Zhang","article-title":"Fooling object detectors: Adversarial attacks by half-neighbor masks","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/SP.2017.49"},{"volume-title":"ICML","author":"Croce","article-title":"Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.24963\/ijcai.2018\/368"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.24963\/ijcai.2019\/824"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ICASSP49357.2023.10097180"},{"volume-title":"ICML","author":"Leino","article-title":"Globally-robust neural networks","key":"ref12"},{"volume-title":"ICLR","author":"Weng","article-title":"Evaluating the robustness of neural networks: An extreme value theory approach","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/GlobalSIP.2018.8646356"},{"key":"ref15","article-title":"Output range analysis for deep neural networks","author":"Dutta","year":"2017","journal-title":"CoRR"},{"key":"ref16","article-title":"Exploiting excessive invariance caused by norm-bounded adversarial robustness","author":"Jacobsen","year":"2019","journal-title":"CoRR"},{"key":"ref17","article-title":"GREAT score: Global robustness evaluation of adversarial perturbation using generative models","author":"Li","year":"2023","journal-title":"CoRR"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.cosrev.2020.100270"},{"key":"ref19","first-page":"69","article-title":"Quasi-monte carlo sampling","author":"Owen","year":"2003","journal-title":"Monte Carlo Ray Tracing: Siggraph"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/978-1-4612-2552-2_19"},{"key":"ref21","article-title":"Generative adversarial nets","author":"Goodfellow","year":"2014","journal-title":"NeurIPS"},{"key":"ref22","first-page":"7354","article-title":"Self-attention generative adversarial networks","volume-title":"ICML","author":"Zhang"},{"volume-title":"ICLR","author":"Miyato","article-title":"Spectral normalization for generative adversarial networks","key":"ref23"},{"volume-title":"ICLR","author":"Brock","article-title":"Large scale GAN training for high fidelity natural image synthesis","key":"ref24"},{"key":"ref25","article-title":"Robustbench: a standardized adversarial robustness benchmark","author":"Croce","year":"2021","journal-title":"NeurIPS"}],"event":{"name":"ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2024,4,14]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2024,4,19]]}},"container-title":["ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10445798\/10445803\/10446884.pdf?arnumber=10446884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T04:46:07Z","timestamp":1722573967000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10446884\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,14]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icassp48485.2024.10446884","relation":{},"subject":[],"published":{"date-parts":[[2024,4,14]]}}}