{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:48:52Z","timestamp":1730231332832,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T00:00:00Z","timestamp":1685836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T00:00:00Z","timestamp":1685836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,4]]},"DOI":"10.1109\/icasspw59220.2023.10193555","type":"proceedings-article","created":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T17:30:54Z","timestamp":1690997454000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Adversarial Attacks &amp; Detection on a Deep Learning-Based Digital Pathology Model"],"prefix":"10.1109","author":[{"given":"Eleanna","family":"Vali","sequence":"first","affiliation":[{"name":"National Technical University of Athens,School of Electrical &#x0026; Computer Enginering,Zografou,Greece,157 80"}]},{"given":"Georgios","family":"Alexandridis","sequence":"additional","affiliation":[{"name":"National Technical University of Athens,School of Electrical &#x0026; Computer Enginering,Zografou,Greece,157 80"}]},{"given":"Andreas","family":"Stafylopatis","sequence":"additional","affiliation":[{"name":"National Technical University of Athens,School of Electrical &#x0026; Computer Enginering,Zografou,Greece,157 80"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"crossref","first-page":"19638","DOI":"10.1038\/s41598-021-99015-3","article-title":"Detection and analysis of covid-19 in medical images using deep learning techniques","volume":"11","author":"yang","year":"2021","journal-title":"Scientific Reports"},{"article-title":"Deep residual learning for image recognition","year":"2015","author":"he","key":"ref12"},{"journal-title":"ImaGene","year":"0","key":"ref15"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.3390\/app112311185","article-title":"An improved vgg16 model for pneumonia image classification","volume":"11","author":"jiang","year":"2021","journal-title":"Applied Sciences"},{"article-title":"On the (statistical) detection of adversarial examples","year":"2017","author":"grosse","key":"ref20"},{"article-title":"Very deep convolutional networks for large-scale image recognition","year":"2014","author":"simonyan","key":"ref11"},{"article-title":"Very deep convolutional networks for large-scale image recognition","year":"2015","author":"simonyan","key":"ref22"},{"key":"ref10","first-page":"3","author":"carlini","year":"2017","journal-title":"Adversarial examples are not easily detected Bypassing ten detection methods"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1142\/S0218213018500112"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S2589-7500(19)30123-2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cell.2018.02.010"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107332"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3483207.3483224"},{"article-title":"Detecting adversarial samples from artifacts","year":"2017","author":"feinman","key":"ref19"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23198"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"article-title":"Adversarial attacks and defenses in images, graphs and text: A review","year":"2019","author":"xu","key":"ref7"},{"article-title":"Towards deep learning models resistant to adversarial attacks","year":"2017","author":"madry","key":"ref9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"goodfellow","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.116815"},{"article-title":"Adversarial attacks against medical deep learning systems","year":"2018","author":"finlayson","key":"ref5"}],"event":{"name":"2023 IEEE International Conference on Acoustics, Speech, and Signal Processing Workshops (ICASSPW)","start":{"date-parts":[[2023,6,4]]},"location":"Rhodes Island, Greece","end":{"date-parts":[[2023,6,10]]}},"container-title":["2023 IEEE International Conference on Acoustics, Speech, and Signal Processing Workshops (ICASSPW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10192576\/10192577\/10193555.pdf?arnumber=10193555","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T17:42:03Z","timestamp":1692639723000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10193555\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,4]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icasspw59220.2023.10193555","relation":{},"subject":[],"published":{"date-parts":[[2023,6,4]]}}}