{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:59:24Z","timestamp":1775627964565,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1109\/icmla66185.2025.00055","type":"proceedings-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T19:54:58Z","timestamp":1775591698000},"page":"362-367","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating the Impact of Compression Techniques on the Robustness of CNNs under Natural Corruptions"],"prefix":"10.1109","author":[{"given":"Itallo Patrick Castro Alves","family":"Da Silva","sequence":"first","affiliation":[{"name":"Federal University of Alagoas,Computing Institute,Macei&#x00F3;,Brazil"}]},{"given":"Emanuel Adler Medeiros","family":"Pereira","sequence":"additional","affiliation":[{"name":"Federal University of Rio Grande do Norte,Center of Technology,Natal,Brazil"}]},{"given":"Erick","family":"de Andrade Barboza","sequence":"additional","affiliation":[{"name":"Federal University of Alagoas,Computing Institute,Macei&#x00F3;,Brazil"}]},{"given":"Baldoino Fonseca","family":"Dos Santos Neto","sequence":"additional","affiliation":[{"name":"Federal University of Alagoas,Computing Institute,Macei&#x00F3;,Brazil"}]},{"given":"M\u00e1rcio","family":"de Medeiros Ribeiro","sequence":"additional","affiliation":[{"name":"Federal University of Alagoas,Computing Institute,Macei&#x00F3;,Brazil"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Benchmarking neural network robustness to common corruptions and perturbations","volume-title":"International Conference on Learning Representations","author":"Hendrycks"},{"key":"ref2","article-title":"Robustbench: a standardized adversarial robustness benchmark","volume-title":"Thirty-fifth Conference on Neural Information Processing Systems Datasets and Benchmarks Track (Round 2)","author":"Croce"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00823"},{"key":"ref4","article-title":"To prune, or not to prune: exploring the efficacy of pruning for model compression","author":"Zhu","year":"2017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00286"},{"key":"ref6","article-title":"Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding","author":"Han","year":"2016"},{"key":"ref7","article-title":"TensorFlow: Large-scale machine learning on heterogeneous systems","author":"Abadi","year":"2015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW63382.2024.00358"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s44267-023-00031-w"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-70248-8_12"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DCAS65331.2025.11045487"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref13","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009","journal-title":"University of Toronto"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref15","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"ref17","article-title":"Edge ai literature","year":"2025"},{"key":"ref18","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2014.2313407"}],"event":{"name":"2025 International Conference on Machine Learning and Applications (ICMLA)","location":"Boca Raton, FL, USA","start":{"date-parts":[[2025,12,3]]},"end":{"date-parts":[[2025,12,5]]}},"container-title":["2025 International Conference on Machine Learning and Applications (ICMLA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471302\/11471304\/11471396.pdf?arnumber=11471396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:20:20Z","timestamp":1775625620000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11471396\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icmla66185.2025.00055","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]}}}