{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:07:08Z","timestamp":1740100028748,"version":"3.37.3"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,1,10]],"date-time":"2021-01-10T00:00:00Z","timestamp":1610236800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,10]],"date-time":"2021-01-10T00:00:00Z","timestamp":1610236800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,10]],"date-time":"2021-01-10T00:00:00Z","timestamp":1610236800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003329","name":"Spanish Ministerio de Econom\u00eda y Competitividad","doi-asserted-by":"publisher","award":["TIN2015-65069-C2"],"award-info":[{"award-number":["TIN2015-65069-C2"]}],"id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008425","name":"Xunta de Galicia","doi-asserted-by":"publisher","award":["GRC2014\/035,ED431G\/Ol"],"award-info":[{"award-number":["GRC2014\/035,ED431G\/Ol"]}],"id":[{"id":"10.13039\/501100008425","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,10]]},"DOI":"10.1109\/icpr48806.2021.9413170","type":"proceedings-article","created":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T02:15:54Z","timestamp":1620267354000},"page":"378-384","source":"Crossref","is-referenced-by-count":1,"title":["A delayed Elastic-Net approach for performing adversarial attacks"],"prefix":"10.1109","author":[{"given":"Brais","family":"Cancela","sequence":"first","affiliation":[]},{"given":"Veronica","family":"Bolon-Canedo","sequence":"additional","affiliation":[]},{"given":"Amparo","family":"Alonso-Betanzos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"Int Conf on Learning Representations"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref12","article-title":"Ead: elastic-net attacks to deep neural networks via adversarial examples","author":"chen","year":"2018","journal-title":"Thirty-Second AAAI Conference on Artificial Intelligence"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1137\/080716542"},{"journal-title":"Keras","year":"2015","author":"chollet","key":"ref14"},{"journal-title":"Adam A method for stochastic optimization","year":"2014","author":"kingma","key":"ref15"},{"journal-title":"MNIST Handwritten Digit Database","year":"2010","author":"lecun","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01258-8_39"},{"key":"ref4","article-title":"Cascade adversarial machine learning regularized with a unified embedding","author":"na","year":"2018","journal-title":"Int Conf on Learning Representations"},{"key":"ref3","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2018","journal-title":"International Conference on Learning Representations"},{"key":"ref6","article-title":"Benchmarking neural network robustness to common corruptions and perturbations","author":"hendrycks","year":"2019","journal-title":"Int Conf on Learning Representations"},{"key":"ref5","first-page":"274","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","volume":"80","author":"athalye","year":"2018","journal-title":"Proc of the 35th International Conference on Machine Learning"},{"key":"ref8","article-title":"Mitigating adversarial effects through randomization","author":"xie","year":"2018","journal-title":"Int Conf on Learning Representations"},{"key":"ref7","article-title":"Learning multiple layers of features from tiny images","author":"krizhevsky","year":"2009","journal-title":"Citeseer Tech Rep"},{"key":"ref2","first-page":"387","article-title":"Evasion attacks against machine learning at test time","author":"biggio","year":"2013","journal-title":"Machine Learning and Knowledge Discovery in Databases"},{"journal-title":"Evaluating the robustness of neural networks An extreme value theory approach","year":"2018","author":"weng","key":"ref9"},{"key":"ref1","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"International Conference on Learning Representations"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.634"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v31i1.11231","article-title":"Inception-v4, inception-resnet and the impact of residual connections on learning","author":"szegedy","year":"2017","journal-title":"Thirty-First AAAI Conference on Artificial Intelligence"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00907"},{"key":"ref25","first-page":"4700","article-title":"Densely connected convolutional networks","author":"huang","year":"2017","journal-title":"Proc of the IEEE Conference on Computer Vision and Pattern Recognition"}],"event":{"name":"2020 25th International Conference on Pattern Recognition (ICPR)","start":{"date-parts":[[2021,1,10]]},"location":"Milan, Italy","end":{"date-parts":[[2021,1,15]]}},"container-title":["2020 25th International Conference on Pattern Recognition (ICPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9411940\/9411911\/09413170.pdf?arnumber=9413170","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,3]],"date-time":"2023-11-03T09:06:10Z","timestamp":1699002370000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9413170\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,10]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icpr48806.2021.9413170","relation":{},"subject":[],"published":{"date-parts":[[2021,1,10]]}}}