{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T13:37:25Z","timestamp":1768311445561,"version":"3.49.0"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T00:00:00Z","timestamp":1763424000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T00:00:00Z","timestamp":1763424000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,18]]},"DOI":"10.1109\/icspis67605.2025.11318369","type":"proceedings-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T18:20:02Z","timestamp":1768242002000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Invariance Testing Through Adversarial Perturbations: A Short Survey of Methods and Challenges"],"prefix":"10.1109","author":[{"given":"Yuanzhe","family":"Jin","sequence":"first","affiliation":[{"name":"University of Oxford,Department of Engineering Science,Oxford,United Kingdom"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459476"},{"key":"ref2","article-title":"Fast algorithms for gaussian noise invariant independent component analysis","volume-title":"Advances in Neural Information Processing Systems","volume":"26","author":"Voss","year":"2013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4097\/kjae.2017.70.2.144"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1971.1054668"},{"key":"ref5","article-title":"Gaussian process training with input noise","volume":"24","author":"McHutchon","year":"2011","journal-title":"Advances in neural information processing systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2004.832656"},{"key":"ref7","article-title":"Gaussianad: Gaussian-centric end-to-end autonomous driving","author":"Zheng","year":"2024"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2014.2304637"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2016.36"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref11","article-title":"Adversarial reprogramming of neural networks","author":"Elsayed","year":"2018"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"ref13","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014"},{"key":"ref14","article-title":"Ensemble adversarial training: Attacks and defenses","author":"Tram\u00e8r","year":"2017"},{"key":"ref15","article-title":"Nesterov accelerated gradient and scale invariance for adversarial attacks","author":"Lin","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00284"},{"key":"ref17","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2019"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref20","article-title":"A review of adversarial attack and defense for classification methods","author":"Li","year":"2021","journal-title":"CoRR"},{"key":"ref21","article-title":"Adversarial training for free!","volume-title":"Advances in Neural Information Processing Systems","volume":"32","author":"Shafahi","year":"2019"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/591"},{"key":"ref23","article-title":"Exploiting excessive invariance caused by norm-bounded adversarial robustness","author":"Jacobsen","year":"2019"},{"key":"ref24","article-title":"Invariance vs robustness of neural networks","author":"Kamath","year":"2020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1214\/20-sts797"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.32657\/10356\/143316"},{"key":"ref27","first-page":"9561","article-title":"Fundamental tradeoffs between invariance and sensitivity to adversarial perturbations","volume-title":"Proc. of the 37th International Conference on Machine Learning","volume":"119","author":"Tramer"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.5201\/ipol.2011.my-asift"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2006.50"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2344436.2344440"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-7128-5"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1994.413536"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/79.939835"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/11427995_42"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2009.20"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3030671"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00373"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03338-5_3"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453079"},{"key":"ref41","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"Chen","year":"2017"},{"key":"ref42","article-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain","author":"Gu","year":"2017"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"},{"key":"ref44","first-page":"1615","article-title":"Turning your weakness into a strength: Watermarking deep neural networks by backdooring","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Adi"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329808"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04434-z"}],"event":{"name":"2025 8th International Conference on Signal Processing and Information Security (ICSPIS)","location":"Dubai, United Arab Emirates","start":{"date-parts":[[2025,11,18]]},"end":{"date-parts":[[2025,11,20]]}},"container-title":["2025 8th International Conference on Signal Processing and Information Security (ICSPIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11318309\/11318310\/11318369.pdf?arnumber=11318369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T08:16:30Z","timestamp":1768292190000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11318369\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,18]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/icspis67605.2025.11318369","relation":{},"subject":[],"published":{"date-parts":[[2025,11,18]]}}}