{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:33:57Z","timestamp":1730234037351,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T00:00:00Z","timestamp":1672963200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T00:00:00Z","timestamp":1672963200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,6]]},"DOI":"10.1109\/icce56470.2023.10043484","type":"proceedings-article","created":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T18:57:49Z","timestamp":1676660269000},"page":"01-05","source":"Crossref","is-referenced-by-count":4,"title":["Invisible Encoded Backdoor attack on DNNs using Conditional GAN"],"prefix":"10.1109","author":[{"given":"Iram","family":"Arshad","sequence":"first","affiliation":[{"name":"Software Research Institute Technological University of Shannon: Midland Midwest,Westmeath,Athlone,Ireland"}]},{"given":"Yuansong","family":"Qiao","sequence":"additional","affiliation":[{"name":"Software Research Institute Technological University of Shannon: Midland Midwest,Westmeath,Athlone,Ireland"}]},{"given":"Brian","family":"Lee","sequence":"additional","affiliation":[{"name":"Software Research Institute Technological University of Shannon: Midland Midwest,Westmeath,Athlone,Ireland"}]},{"given":"Yuhang","family":"Ye","sequence":"additional","affiliation":[{"name":"Software Research Institute Technological University of Shannon: Midland Midwest,Westmeath,Athlone,Ireland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2022.3182979"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr42600.2020.00219"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453108"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DTPI52967.2021.9540109"},{"key":"ref7","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv preprint"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8802997"},{"key":"ref9","article-title":"Label-consistent backdoor attacks","author":"Turner","year":"2019","journal-title":"arXiv preprint"},{"key":"ref10","first-page":"6106","article-title":"Poison frogs! targeted clean-label poisoning attacks on neural networks","volume-title":"Proceedings of the 32nd International Conference on Neural Information Processing Systems","author":"Shafahi","year":"2018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr42600.2020.01445"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SPW50608.2020.00024"},{"key":"ref13","article-title":"Conditional generative adversarial nets","author":"Mirza","year":"2014","journal-title":"arXiv preprint"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1406.3269"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.4.541"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2502579"},{"issue":"276","key":"ref17","first-page":"2","article-title":"Learning algorithms for classification: A comparison on handwritten digit recognition","volume":"261","author":"Yann","year":"1995","journal-title":"Neural networks: the statistical mechanics perspective"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO54536.2021.9616118"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58607-2_11"}],"event":{"name":"2023 IEEE International Conference on Consumer Electronics (ICCE)","start":{"date-parts":[[2023,1,6]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2023,1,8]]}},"container-title":["2023 IEEE International Conference on Consumer Electronics (ICCE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10043349\/10043179\/10043484.pdf?arnumber=10043484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T14:58:25Z","timestamp":1707836305000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10043484\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icce56470.2023.10043484","relation":{},"subject":[],"published":{"date-parts":[[2023,1,6]]}}}