{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:39:00Z","timestamp":1740101940459,"version":"3.37.3"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,4,21]],"date-time":"2023-04-21T00:00:00Z","timestamp":1682035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,21]],"date-time":"2023-04-21T00:00:00Z","timestamp":1682035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"publisher","award":["2020AAA0107800"],"award-info":[{"award-number":["2020AAA0107800"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,4,21]]},"DOI":"10.1109\/icccs57501.2023.10151180","type":"proceedings-article","created":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T18:04:47Z","timestamp":1687802687000},"page":"1109-1116","source":"Crossref","is-referenced-by-count":0,"title":["A Convenient Deep Learning Model Attack and Defense Evaluation Analysis Platform"],"prefix":"10.1109","author":[{"given":"Bingjun","family":"He","sequence":"first","affiliation":[{"name":"30th Research Institute of China, Electronic Technology Group Corporation,Chengdu,China"}]},{"given":"Yu","family":"Luo","sequence":"additional","affiliation":[{"name":"30th Research Institute of China, Electronic Technology Group Corporation,Chengdu,China"}]},{"given":"Yifan","family":"Wang","sequence":"additional","affiliation":[{"name":"Sichuan Expressway Construction &#x0026; Development Group Co., Ltd,Chengdu,China"}]},{"given":"Zhi","family":"Sun","sequence":"additional","affiliation":[{"name":"30th Research Institute of China, Electronic Technology Group Corporation,Chengdu,China"}]},{"given":"Jianfeng","family":"Chen","sequence":"additional","affiliation":[{"name":"30th Research Institute of China, Electronic Technology Group Corporation,Chengdu,China"}]},{"given":"Ye","family":"Han","sequence":"additional","affiliation":[{"name":"30th Research Institute of China, Electronic Technology Group Corporation,Chengdu,China"}]}],"member":"263","reference":[{"journal-title":"Adversarial Robustness Toolbox V1 0 0","year":"2018","author":"nicolae","key":"ref13"},{"journal-title":"Ead elastic-net attacks to deep neural networks via adversarial examples","year":"2017","author":"chen","key":"ref35"},{"journal-title":"Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks","year":"2020","author":"croce","key":"ref12"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"journal-title":"Decision-Based Adversarial Attacks Reliable Attacks Against Black-Box Machine Learning Models","year":"2017","author":"brendel","key":"ref15"},{"key":"ref37","article-title":"Adversarial Machine Learning at Scale","author":"kurakin","year":"2016","journal-title":"ArXiv"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00045"},{"journal-title":"Ensemble adversarial training Attacks and defenses","year":"2017","author":"tramer","key":"ref36"},{"journal-title":"Adversarial transformation networks Learning to generate adversarial examples","year":"2017","author":"baluja","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"journal-title":"RobustBench a standardized adversarial robustness benchmark","year":"2020","author":"croce","key":"ref11"},{"journal-title":"Decision Boundary Analysis of Adversarial Examples","year":"2018","author":"he","key":"ref33"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00023"},{"key":"ref32","article-title":"The Limitations of Deep Learning in Adversarial Settings","author":"papernot","year":"2015","journal-title":"2016 IEEE European Symposium on Security and Privacy (EuroS&P)"},{"key":"ref2","article-title":"Deep Neural Networks are Easily Fooled: High Confidence Predictions for Unrecognizable Images","volume":"abs 1412 1897","author":"nguyen","year":"2014","journal-title":"[J] CoRR"},{"key":"ref1","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"Computer Science"},{"journal-title":"Simple black-box adversarial attacks","year":"2019","author":"guo","key":"ref17"},{"journal-title":"Improving the adversarial robustness and interpretability of deep neural networks by regularizing their input gradients","year":"2017","author":"ross","key":"ref39"},{"journal-title":"Zoo Zeroth order optimization based black-box attacks to deep neural networks without training substitute models","year":"2017","author":"chen","key":"ref16"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"journal-title":"The Limitations of Model Uncertainty in Adversarial Settings","year":"2018","author":"grosse","key":"ref19"},{"journal-title":"Adversarial Robustness Assessment Why both L_0 and L_ Attacks Are Necessary","year":"2019","author":"kotyan","key":"ref18"},{"journal-title":"Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks","year":"2020","author":"croce","key":"ref24"},{"journal-title":"Towards deep learning models resistant to adversarial attacks","year":"2017","author":"madry","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"journal-title":"Adversarial examples in the physical world","year":"2016","author":"kurakin","key":"ref25"},{"journal-title":"Wasserstein adversarial examples via projected sinkhorn iterations","year":"2019","author":"wong","key":"ref20"},{"key":"ref42","article-title":"Image quality assessment: from error visibility to structural similarity","volume":"13","author":"zhou","year":"2004","journal-title":"IEEE Trans Image Process"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134606"},{"journal-title":"Ensemble adversarial training Attacks and defenses","year":"2017","author":"tramer","key":"ref22"},{"key":"ref21","article-title":"Explaining and Harnessing Adversarial Examples","author":"goodfellow","year":"2014","journal-title":"Computer Science"},{"journal-title":"Ensemble adversarial training Attacks and defenses","year":"2017","author":"tramer","key":"ref28"},{"journal-title":"Adversarial examples in the physical world","year":"2016","author":"kurakin","key":"ref27"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref8","article-title":"advertorch vO.1: An Adversarial Robustness Toolbox based on PyTorch","volume":"abs 1902 7623","author":"ding","year":"2019","journal-title":"CoRR"},{"key":"ref7","article-title":"McDaniel. cleverhans vO.1: an adversarial machine learning library","volume":"abs 1610 768","author":"goodfellow","year":"2016","journal-title":"CoRR"},{"key":"ref9","article-title":"Advbox: a toolbox to generate adversarial examples that fool neural networks","author":"goodman","year":"2020","journal-title":"ArXiv"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5928"},{"journal-title":"Textbugger Generating adversarial text against real-world applications","year":"2018","author":"li","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.12720\/jait.13.6.539-548"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.12720\/jait.6.3.88-95"},{"journal-title":"Mitigating adversarial effects through randomization","year":"2017","author":"xie","key":"ref40"}],"event":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","start":{"date-parts":[[2023,4,21]]},"location":"Guangzhou, China","end":{"date-parts":[[2023,4,23]]}},"container-title":["2023 8th International Conference on Computer and Communication Systems (ICCCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10150427\/10150444\/10151180.pdf?arnumber=10151180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T17:31:13Z","timestamp":1689615073000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10151180\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,21]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/icccs57501.2023.10151180","relation":{},"subject":[],"published":{"date-parts":[[2023,4,21]]}}}