{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:12:06Z","timestamp":1755839526457,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T00:00:00Z","timestamp":1685836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T00:00:00Z","timestamp":1685836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,4]]},"DOI":"10.1109\/icassp49357.2023.10097188","type":"proceedings-article","created":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T13:28:30Z","timestamp":1683293310000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["Interpretation of Neural Networks is Susceptible to Universal Adversarial Perturbations"],"prefix":"10.1109","author":[{"given":"Haniyeh Ehsani","family":"Oskouie","sequence":"first","affiliation":[{"name":"Sharif University of Technology,Department of Computer Engineering"}]},{"given":"Farzan","family":"Farnia","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong,Department of Computer Science &#x0026; Engineering"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682430"},{"article-title":"Universal adversarial attack using very few test examples","year":"2019","author":"deshpande","key":"ref12"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413467"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053747"},{"key":"ref11","first-page":"8562","article-title":"Art of singular vectors and universal adversarial perturbations","author":"khrulkov","year":"2018","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00015"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639344"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref17","first-page":"1803","article-title":"How to explain individual classification decisions","volume":"11","author":"baehrens","year":"2010","journal-title":"Journal of Machine Learning Research"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747773"},{"article-title":"Interpretation of neural networks is susceptible to universal adversarial perturbations","year":"2022","author":"oskouie","key":"ref19"},{"article-title":"Deep inside convolutional networks: Visualising image classification models and saliency maps","year":"2013","author":"simonyan","key":"ref18"},{"article-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications","year":"2017","author":"howard","key":"ref24"},{"article-title":"Very deep convolutional networks for large-scale image recognition","year":"2014","author":"simonyan","key":"ref23"},{"key":"ref25","article-title":"Universal adversarial training","author":"najibi","year":"2020","journal-title":"Association for the Advancement of Artificial Intelligence"},{"article-title":"The mnist database of handwritten digits","year":"1998","author":"lecun","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"article-title":"Learning multiple layers of features from tiny images","year":"2009","author":"krizhevsky","key":"ref21"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref7","article-title":"Fooling neural network interpretations via adversarial model manipulation","volume":"32","author":"heo","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00465"},{"article-title":"Intriguing properties of neural networks","year":"2013","author":"szegedy","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/nbt.3300"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013681"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"goodfellow","key":"ref5"}],"event":{"name":"ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2023,6,4]]},"location":"Rhodes Island, Greece","end":{"date-parts":[[2023,6,10]]}},"container-title":["ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10094559\/10094560\/10097188.pdf?arnumber=10097188","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T13:58:01Z","timestamp":1700488681000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10097188\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,4]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icassp49357.2023.10097188","relation":{},"subject":[],"published":{"date-parts":[[2023,6,4]]}}}