{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T18:01:47Z","timestamp":1774634507999,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,8]],"date-time":"2023-10-08T00:00:00Z","timestamp":1696723200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,8]],"date-time":"2023-10-08T00:00:00Z","timestamp":1696723200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,8]]},"DOI":"10.1109\/icip49359.2023.10222040","type":"proceedings-article","created":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T17:58:31Z","timestamp":1694455111000},"page":"1260-1264","source":"Crossref","is-referenced-by-count":6,"title":["OOD Attack: Generating Overconfident out-of-Distribution Examples to Fool Deep Neural Classifiers"],"prefix":"10.1109","author":[{"given":"Keke","family":"Tang","sequence":"first","affiliation":[{"name":"Guangzhou University"}]},{"given":"Xujian","family":"Cai","sequence":"additional","affiliation":[{"name":"Guangzhou University"}]},{"given":"Weilong","family":"Peng","sequence":"additional","affiliation":[{"name":"Guangzhou University"}]},{"given":"Shudong","family":"Li","sequence":"additional","affiliation":[{"name":"Guangzhou University"}]},{"given":"Wenping","family":"Wang","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2022.3196129"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00119"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00013"},{"key":"ref5","article-title":"A baseline for detecting misclassified and out-of-distribution examples in neural networks","author":"Hendrycks","year":"2016","journal-title":"ICLR"},{"key":"ref6","article-title":"Enhancing the reliability of out-of-distribution image detection in neural networks","author":"Liang","year":"2018","journal-title":"ICLR"},{"key":"ref7","article-title":"Energy-based out-of-distribution detection","volume":"33","author":"Liu","year":"2020","journal-title":"NeurIPS"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01237-3_34"},{"key":"ref9","article-title":"Mitigating neural network overconfidence with logit normalization","author":"Wei","year":"2022","journal-title":"ICML"},{"key":"ref10","article-title":"Training confidence-calibrated classifiers for detecting out-of-distribution samples","author":"Lee","year":"2018","journal-title":"ICLR"},{"key":"ref11","article-title":"Deep anomaly detection with outlier exposure","author":"Hendrycks","year":"2018","journal-title":"ICLR"},{"key":"ref12","article-title":"Towards neural networks that provably know when they don\u2019t know","author":"Meinke","year":"2019","journal-title":"ICLR"},{"key":"ref13","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2014","journal-title":"ICLR"},{"key":"ref14","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2015","journal-title":"ICLR"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/543"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00044"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2019.12.012"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref23","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref24","article-title":"Reading digits in natural images with unsupervised feature learning","author":"Netzer","year":"2011"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"}],"event":{"name":"2023 IEEE International Conference on Image Processing (ICIP)","location":"Kuala Lumpur, Malaysia","start":{"date-parts":[[2023,10,8]]},"end":{"date-parts":[[2023,10,11]]}},"container-title":["2023 IEEE International Conference on Image Processing (ICIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10221937\/10221892\/10222040.pdf?arnumber=10222040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T22:59:46Z","timestamp":1710370786000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10222040\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,8]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icip49359.2023.10222040","relation":{},"subject":[],"published":{"date-parts":[[2023,10,8]]}}}