{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:29:34Z","timestamp":1752283774862,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T00:00:00Z","timestamp":1632009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T00:00:00Z","timestamp":1632009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,19]]},"DOI":"10.1109\/icip42928.2021.9506804","type":"proceedings-article","created":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T21:08:41Z","timestamp":1629752921000},"page":"3607-3611","source":"Crossref","is-referenced-by-count":5,"title":["Detecting C&amp;W Adversarial Images Based on Noise Addition-Then-Denoising"],"prefix":"10.1109","author":[{"given":"Kang","family":"Deng","sequence":"first","affiliation":[{"name":"Southwest University of Science and Technology,School of Computer Science &#x0026; Technology,Mianyang,China,621010"}]},{"given":"Anjie","family":"Peng","sequence":"additional","affiliation":[{"name":"Southwest University of Science and Technology,School of Computer Science &#x0026; Technology,Mianyang,China,621010"}]},{"given":"Wanli","family":"Dong","sequence":"additional","affiliation":[{"name":"Southwest University of Science and Technology,School of Computer Science &#x0026; Technology,Mianyang,China,621010"}]},{"given":"Hui","family":"Zeng","sequence":"additional","affiliation":[{"name":"Southwest University of Science and Technology,School of Computer Science &#x0026; Technology,Mianyang,China,621010"}]}],"member":"263","reference":[{"key":"ref30","article-title":"Rethinking the inception architecture for computer vision","author":"szegedy","year":"2015","journal-title":"arXiv 1512 00567 [cs]"},{"key":"ref10","article-title":"Adversarial machine learning in image classification: a survey towards the defender&#x2019;s perspective","author":"machado","year":"2020","journal-title":"arXiv 2009 03728"},{"key":"ref11","article-title":"Adversarial and clean data are not twins","author":"gong","year":"2017","journal-title":"arXiv 1704 04960"},{"key":"ref12","article-title":"On the (statistical) detection of adversarial examples","author":"grosse","year":"2017","journal-title":"arXiv 1702 06280"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ICCV.2017.56"},{"key":"ref14","article-title":"On detecting adversarial perturbations","author":"metzen","year":"2017","journal-title":"arXiv 1702 04267"},{"key":"ref15","article-title":"Early methods for detecting adversarial images","author":"hendrycks","year":"2016","journal-title":"arXiv 1608 00530"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICCV.2017.615"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TDSC.2018.2874243"},{"key":"ref18","article-title":"Feature squeezing: detecting adversarial examples in deep neural networks","author":"xu","year":"2017","journal-title":"In Network and Distributed System Security Symposium arXiv 1704 01155"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/s11042-019-7353-6"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TIFS.2020.3021899"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/CVPR42600.2020.00040"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/TIP.2007.901238"},{"key":"ref3","first-page":"2574","article-title":"Deepfool: A simple and accurate method to fool deep neural networks","author":"moosavidezfooli","year":"2015","journal-title":"Proc Computer Vision and Pattern Recognition"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/CVPR.2016.90"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/SP.2017.49"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/TIP.2016.2631888"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"mnih","year":"2015","journal-title":"Nature"},{"key":"ref7","article-title":"Bringing big neural networks to self-driving cars, smart phones, and drones","author":"bourzac","year":"2016","journal-title":"IEEE Spectrum"},{"key":"ref2","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2017","journal-title":"In proceedings of International Conference on Learning Representations arXiv 1706 06083"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/SP.2016.41"},{"key":"ref1","first-page":"1","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"Proceedings of 7th International Conference on Machine Learning"},{"key":"ref20","first-page":"1","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"Proceedings of 7th International Conference on Machine Learning"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/978-3-030-68780-9_37"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/CVPR.2019.00496"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/3128572.3140444"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/978-3-030-63833-7_35"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TIP.2018.2839891"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/3133956.3134057"}],"event":{"name":"2021 IEEE International Conference on Image Processing (ICIP)","start":{"date-parts":[[2021,9,19]]},"location":"Anchorage, AK, USA","end":{"date-parts":[[2021,9,22]]}},"container-title":["2021 IEEE International Conference on Image Processing (ICIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9506008\/9506009\/09506804.pdf?arnumber=9506804","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T00:07:38Z","timestamp":1670371658000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9506804\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,19]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icip42928.2021.9506804","relation":{},"subject":[],"published":{"date-parts":[[2021,9,19]]}}}