{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T15:34:10Z","timestamp":1771515250532,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,16]],"date-time":"2022-10-16T00:00:00Z","timestamp":1665878400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,16]],"date-time":"2022-10-16T00:00:00Z","timestamp":1665878400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,16]]},"DOI":"10.1109\/icip46576.2022.9897807","type":"proceedings-article","created":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T17:27:24Z","timestamp":1667496444000},"page":"3717-3722","source":"Crossref","is-referenced-by-count":8,"title":["Adversarial Label-Poisoning Attacks and Defense for General Multi-Class Models Based on Synthetic Reduced Nearest Neighbor"],"prefix":"10.1109","author":[{"given":"Pooya","family":"Tavallali","sequence":"first","affiliation":[{"name":"University of California,Electrical Engineering and Computer Science,Merced,CA,95348"}]},{"given":"Vahid","family":"Behzadan","sequence":"additional","affiliation":[{"name":"University of New Haven,SAIL Lab,West Haven,CT,06516"}]},{"given":"Azar","family":"Alizadeh","sequence":"additional","affiliation":[{"name":"University of California,Electrical Engineering and Computer Science,Merced,CA,95348"}]},{"given":"Aditya","family":"Ranganath","sequence":"additional","affiliation":[{"name":"University of California,Electrical Engineering and Computer Science,Merced,CA,95348"}]},{"given":"Mukesh","family":"Singhal","sequence":"additional","affiliation":[{"name":"University of California,Electrical Engineering and Computer Science,Merced,CA,95348"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00035"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2012.2223460"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1137\/0222052"},{"key":"ref5","first-page":"111","article-title":"Bounding an attack\u2019s complexity for a simple learning model","volume-title":"Proc. of the First Workshop on Tackling Computer Systems Problems with Machine Learning Techniques (SysML)","author":"Nelson"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/nature16961"},{"key":"ref7","first-page":"97","article-title":"Support vector machines under adversarial label noise","volume-title":"Asian conference on machine learning","author":"Biggio"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP40778.2020.9190986"},{"key":"ref9","article-title":"Poisoning attacks against support vector machines","author":"Biggio","year":"2012"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v29i1.9569"},{"key":"ref11","article-title":"A comprehensive introduction to label noise","author":"Fr\u00e9nay","year":"2014","journal-title":"ESANN"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2292894"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/int.10143"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.38.7.913"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordjournals.aje.a117428"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2307\/3315930"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1972.1054809"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056489"}],"event":{"name":"2022 IEEE International Conference on Image Processing (ICIP)","location":"Bordeaux, France","start":{"date-parts":[[2022,10,16]]},"end":{"date-parts":[[2022,10,19]]}},"container-title":["2022 IEEE International Conference on Image Processing (ICIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9897158\/9897159\/09897807.pdf?arnumber=9897807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T16:00:59Z","timestamp":1705939259000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9897807\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,16]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icip46576.2022.9897807","relation":{},"subject":[],"published":{"date-parts":[[2022,10,16]]}}}