{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T02:20:20Z","timestamp":1730254820591,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,8,21]],"date-time":"2022-08-21T00:00:00Z","timestamp":1661040000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,8,21]],"date-time":"2022-08-21T00:00:00Z","timestamp":1661040000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8,21]]},"DOI":"10.1109\/icpr56361.2022.9956053","type":"proceedings-article","created":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T14:34:13Z","timestamp":1669732453000},"page":"3069-3075","source":"Crossref","is-referenced-by-count":0,"title":["Introducing Diversity In Feature Scatter Adversarial Training Via Synthesis"],"prefix":"10.1109","author":[{"given":"Satyadwyoom","family":"Kumar","sequence":"first","affiliation":[{"name":"Netaji Subhas Institute of Technology,Dept. Electronics and Communication,New-Delhi,India"}]},{"given":"Apurva","family":"Narayan","sequence":"additional","affiliation":[{"name":"The University of British Columbia,Dept. Computer Science,Kelowna,Canada"}]}],"member":"263","reference":[{"key":"ref30","first-page":"5025","article-title":"Adversarial risk and the dangers of evaluating against weak attacks","author":"uesato","year":"2018","journal-title":"International Conference on Machine Learning"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00084"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00283"},{"key":"ref12","first-page":"577","article-title":"Learning to defend by learning to attack","author":"jiang","year":"2021","journal-title":"International Conference on Artificial Intelligence and Statistics"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"goodfellow","key":"ref13"},{"key":"ref14","first-page":"8093","article-title":"Overfitting in adversarially robust deep learning","author":"rice","year":"2020","journal-title":"International Conference on Machine Learning"},{"article-title":"Adversarial training for free!","year":"2019","author":"shafahi","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6017"},{"article-title":"Do adversarially robust imagenet models transfer better?","year":"2020","author":"salman","key":"ref17"},{"article-title":"Fast is better than free: Revisiting adversarial training","year":"2020","author":"wong","key":"ref18"},{"article-title":"Improved network robustness with adversary critic","year":"2018","author":"matyasko","key":"ref19"},{"key":"ref28","first-page":"2292","article-title":"Sinkhorn distances: Lightspeed computation of optimal transport","volume":"26","author":"cuturi","year":"2013","journal-title":"Advances in neural information processing systems"},{"key":"ref4","article-title":"Thermometer encoding: One hot way to resist adversarial examples","author":"buckman","year":"2018","journal-title":"International Conference on Learning Representations"},{"key":"ref27","first-page":"234","article-title":"U-net: Convolutional networks for biomedical image segmentation","author":"ronneberger","year":"2015","journal-title":"International Conference on Medical Image Computing and Computer-Assisted Intervention"},{"article-title":"Defense-gan: Protecting classifiers against adversarial attacks using generative models","year":"2018","author":"samangouei","key":"ref3"},{"article-title":"Towards deep learning models resistant to adversarial attacks","year":"2017","author":"madry","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"article-title":"Pixeldefend: Leveraging generative models to understand and defend against adversarial examples","year":"2017","author":"song","key":"ref5"},{"key":"ref8","first-page":"1670","article-title":"More data can expand the generalization gap between adversarially robust and standard models","author":"chen","year":"2020","journal-title":"International Conference on Machine Learning"},{"key":"ref7","first-page":"274","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","author":"athalye","year":"2018","journal-title":"International Conference on Machine Learning"},{"key":"ref2","article-title":"Adversarialexamples arenotbugs, theyarefeatures","volume":"125136","author":"ilyasa","year":"2019","journal-title":"Procofthe33rdAnnual Confon NeuralInformationProcessingSystems (NeurIPS)"},{"key":"ref9","first-page":"1831","article-title":"Defense against adversarial attacks using feature scattering-based adversarial training","volume":"32","author":"zhang","year":"2019","journal-title":"Advances in neural information processing systems"},{"article-title":"Intriguing properties of neural networks","year":"2013","author":"szegedy","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/543"},{"key":"ref22","first-page":"214","article-title":"Wasserstein generative adversarial networks","author":"arjovsky","year":"2017","journal-title":"International Conference on Machine Learning"},{"article-title":"A direct approach to robust deep learning using adversarial networks","year":"2019","author":"wang","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00152"},{"key":"ref23","article-title":"Generative adversarial nets","volume":"27","author":"goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"article-title":"Reading digits in natural images with unsupervised feature learning","year":"2011","author":"netzer","key":"ref26"},{"article-title":"Learning multiple layers of features from tiny images","year":"2009","author":"krizhevsky","key":"ref25"}],"event":{"name":"2022 26th International Conference on Pattern Recognition (ICPR)","start":{"date-parts":[[2022,8,21]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2022,8,25]]}},"container-title":["2022 26th International Conference on Pattern Recognition (ICPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9956007\/9955631\/09956053.pdf?arnumber=9956053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T15:03:20Z","timestamp":1671462200000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9956053\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,21]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icpr56361.2022.9956053","relation":{},"subject":[],"published":{"date-parts":[[2022,8,21]]}}}