{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T06:07:38Z","timestamp":1749017258956,"version":"3.37.3"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,10]],"date-time":"2023-08-10T00:00:00Z","timestamp":1691625600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,10]],"date-time":"2023-08-10T00:00:00Z","timestamp":1691625600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,10]]},"DOI":"10.1109\/iccc57788.2023.10233298","type":"proceedings-article","created":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T17:28:28Z","timestamp":1693934908000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Adversarial Domain Generalization Defense for Automatic Modulation Classification"],"prefix":"10.1109","author":[{"given":"Sicheng","family":"Zhang","sequence":"first","affiliation":[{"name":"Harbin Engineering University,College of Information and Communication Engineering,Harbin,China"}]},{"given":"Jie","family":"Liu","sequence":"additional","affiliation":[{"name":"Harbin Engineering University,College of Information and Communication Engineering,Harbin,China"}]},{"given":"Zliida","family":"Bao","sequence":"additional","affiliation":[{"name":"Harbin Engineering University,College of Information and Communication Engineering,Harbin,China"}]},{"given":"Shui","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Technology Sydney,School of Computer Science,Sydney,Australia"}]},{"given":"Yun","family":"Lin","sequence":"additional","affiliation":[{"name":"University of Technology Sydney,School of Computer Science,Sydney,Australia"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3124855"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3213371"},{"key":"ref15","first-page":"13834","article-title":"Toalign: Task-oriented alignment for unsupervised domain adaptation","volume":"34","author":"wei","year":"2021","journal-title":"Proc Adv Neural Inf Process Syst (NIPS)"},{"key":"ref14","first-page":"6438","article-title":"Manifold mixup: Better representations by interpolating hidden states","volume":"97","author":"verma","year":"2019","journal-title":"Proc Int Conf Mach Learn (ICML)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC54389.2021.9674255"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.10.010"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3085433"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3135829"},{"key":"ref17","article-title":"A kernel method for the two-sample-problem","volume":"19","author":"gretton","year":"2006","journal-title":"Proc Adv Neural Inf Process Syst (NIPS)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref18","article-title":"Convolutional radio modulation recognition networks","author":"o'shea","year":"0","journal-title":"Eng Appl Artif Intell"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3324921.3328792"},{"key":"ref7","first-page":"1","article-title":"Adversarial examples in the physical world","author":"kurakin","year":"2017","journal-title":"Proc Int Conf Learn Representations Workshop"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.3032744"},{"journal-title":"Intriguing properties of neural networks","year":"2013","author":"szegedy","key":"ref3"},{"key":"ref6","first-page":"arxiv:1706.06083","author":"madry","year":"2017","journal-title":"Towards deep learning models resistant to adversarial attacks"},{"key":"ref5","first-page":"arxiv:1412.6572","author":"goodfellow","year":"2014","journal-title":"Explaining and Harnessing Adversarial Examples"}],"event":{"name":"2023 IEEE\/CIC International Conference on Communications in China (ICCC)","start":{"date-parts":[[2023,8,10]]},"location":"Dalian, China","end":{"date-parts":[[2023,8,12]]}},"container-title":["2023 IEEE\/CIC International Conference on Communications in China (ICCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10233255\/10233122\/10233298.pdf?arnumber=10233298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T17:56:25Z","timestamp":1695664585000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10233298\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iccc57788.2023.10233298","relation":{},"subject":[],"published":{"date-parts":[[2023,8,10]]}}}