{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:07:53Z","timestamp":1730246873154,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/icip.2019.8803776","type":"proceedings-article","created":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T19:32:48Z","timestamp":1566847968000},"page":"2289-2293","source":"Crossref","is-referenced-by-count":5,"title":["Exploiting CNN Layer Activations to Improve Adversarial Image Classification"],"prefix":"10.1109","author":[{"given":"R.","family":"Caldelli","sequence":"first","affiliation":[]},{"given":"R.","family":"Becarelli","sequence":"additional","affiliation":[]},{"given":"F.","family":"Carrara","sequence":"additional","affiliation":[]},{"given":"F.","family":"Falchi","sequence":"additional","affiliation":[]},{"given":"G.","family":"Amato","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.615"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140444"},{"article-title":"Overfeat: Integrated recognition, localization and detection using con-volutional networks","year":"2013","author":"sermanet","key":"ref12"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-10590-1_38","article-title":"Neural codes for image retrieval","author":"babenko","year":"2014","journal-title":"Computer Vision&#x2013;ECCV 2014"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2014.131"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3095713.3095753"},{"key":"ref16","first-page":"1","article-title":"Adversarial image detection in deep neural networks","author":"carrara","year":"2018","journal-title":"Multimedia Tools and Applications"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-99978-4_27","article-title":"Trace and detect adversarial attacks on CNNs using feature response maps","author":"amirian","year":"2018","journal-title":"8th IAPR TC3 Workshop on Artificial Neural Networks in Pattern Recognition (ANNPR)"},{"key":"ref18","article-title":"Adversarial examples detection in features distance spaces","author":"carrara","year":"2018","journal-title":"Proceedings of the International Workshop on Objectionable Content and Misinformation (WOCM18)"},{"article-title":"NIPS 2017: competition on adversarial attacks and defenses","year":"0","author":"brain","key":"ref19"},{"article-title":"Distillation as a defense to adversarial perturbations against deep neural networks","year":"2015","author":"papernot","key":"ref4"},{"article-title":"Learning with a strong adversary","year":"2015","author":"huang","key":"ref3"},{"article-title":"Adversarial and clean data are not twins","year":"2017","author":"gong","key":"ref6"},{"article-title":"Feature squeezing: Detecting adversarial examples in deep neural networks","year":"2017","author":"xu","key":"ref5"},{"article-title":"Detecting adversarial samples from artifacts","year":"2017","author":"feinman","key":"ref8"},{"article-title":"On detecting adversarial perturbations","year":"2017","author":"metzen","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553305"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"goodfellow","key":"ref1"},{"article-title":"On the (statistical) detection of adversarial examples","year":"2017","author":"grosse","key":"ref9"},{"year":"0","key":"ref20","article-title":"Imagenet Large Scale Visual Recognition Challenge 2014"},{"key":"ref22","article-title":"Vi-sualizing high-dimensional data using t-sne","volume":"9","author":"der maaten","year":"2008","journal-title":"Journal of Machine Learning Research"},{"article-title":"cleverhans v2.0.0: an adversarial machine learning library","year":"2017","author":"papernot","key":"ref21"}],"event":{"name":"2019 IEEE International Conference on Image Processing (ICIP)","start":{"date-parts":[[2019,9,22]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2019,9,25]]}},"container-title":["2019 IEEE International Conference on Image Processing (ICIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8791230\/8799366\/08803776.pdf?arnumber=8803776","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T15:37:06Z","timestamp":1658158626000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8803776\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icip.2019.8803776","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}