{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T04:22:27Z","timestamp":1744258947629,"version":"3.40.4"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,12]],"date-time":"2021-07-12T00:00:00Z","timestamp":1626048000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,12]],"date-time":"2021-07-12T00:00:00Z","timestamp":1626048000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,12]]},"DOI":"10.1109\/iisa52424.2021.9555552","type":"proceedings-article","created":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:35:02Z","timestamp":1633908902000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Robustness of Compressed Deep Neural Networks with Adversarial Training"],"prefix":"10.1109","author":[{"given":"Zhang","family":"Yunchun","sequence":"first","affiliation":[{"name":"Yunnan University,School of Software,Kunming,P.R. China"}]},{"given":"Li","family":"Chengjie","sequence":"additional","affiliation":[{"name":"Yunnan University,School of Software,Kunming,P.R. China"}]},{"given":"Wang","family":"Wangwang","sequence":"additional","affiliation":[{"name":"Yunnan University,School of Software,Kunming,P.R. China"}]},{"given":"Zhong","family":"Yuting","sequence":"additional","affiliation":[{"name":"Yunnan University,School of Software,Kunming,P.R. China"}]},{"given":"Zhang","family":"Xin","sequence":"additional","affiliation":[{"name":"Yunnan University,School of Software,Kunming,P.R. China"}]},{"given":"Zhang","family":"Yulin","sequence":"additional","affiliation":[{"name":"Yunnan University,School of Software,Kunming,P.R. China"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Compressing deep convolutional networks using vector quantization","volume":"abs 1412 6115","author":"gong","year":"2014","journal-title":"ACM Computing Research Repository"},{"key":"ref11","first-page":"2285","article-title":"Compressing neural networks with the hashing trick","author":"chen","year":"2015","journal-title":"Proc Machine Learning Research Workshop Conf"},{"key":"ref12","article-title":"Distilling the knowledge in a neural net-work","volume":"abs 1503 2531","author":"hinton","year":"2015","journal-title":"ACM Computing Research Repository"},{"key":"ref13","article-title":"To compress or not to compress: Understanding the interactions between adversarial attacks and neural network compression","author":"zhao","year":"2018","journal-title":"The Conference on Systems and Machine Learning"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"2012","DOI":"10.1145\/3065386","article-title":"Imagenet classifi-cation with deep convolutional neural networks","volume":"60","author":"krizhevsky","year":"2017","journal-title":"Communications of the ACM"},{"key":"ref16","article-title":"Very deep convolutiona networks for large-scale image recognition","author":"simonyan","year":"2015","journal-title":"Internatonal Conference on Learning Representations (ICLR)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3212725.3212726"},{"key":"ref19","article-title":"Quantizing deep convolutional networks for efficient inference: A whitepaper","author":"krishnamoorthi","year":"2018","journal-title":"arXiv 1806 08342"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"journal-title":"Adversarial examples are not easily detected Bypassing ten detection methods","year":"2017","author":"carlini","key":"ref5"},{"key":"ref8","article-title":"Deep Compression:Compressing Deep Neural Networks with Pruning, Trained Quantization and Huffman Coding","author":"han","year":"2016","journal-title":"ICLRE"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100199"},{"journal-title":"Explaining and Har-nessing Adversarial Examples","year":"2015","author":"goodfellow","key":"ref2"},{"key":"ref9","article-title":"Learning both weights and connections for efficient neural networks","author":"han","year":"2015","journal-title":"NIPS"},{"journal-title":"Intriguing properties of neural networks","year":"2014","author":"szegedy","key":"ref1"},{"key":"ref20","article-title":"Binaryconnect:Training deep neural networks with binary weights during propagations","author":"courbariaux","year":"2015","journal-title":"NIPS"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2970615"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00339"},{"key":"ref24","article-title":"Adversarial attacks and defenses in images, graphs and text: A review","author":"xu","year":"2019","journal-title":"arXiv 1909 08072"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2933524"},{"key":"ref25","first-page":"1","article-title":"Domain-adversarial training of neural networks","volume":"17","author":"ganin","year":"2016","journal-title":"J Mach Learn Res"}],"event":{"name":"2021 12th International Conference on Information, Intelligence, Systems & Applications (IISA)","start":{"date-parts":[[2021,7,12]]},"location":"Chania Crete, Greece","end":{"date-parts":[[2021,7,14]]}},"container-title":["2021 12th International Conference on Information, Intelligence, Systems &amp; Applications (IISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9555494\/9555495\/09555552.pdf?arnumber=9555552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T17:52:30Z","timestamp":1744221150000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9555552\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,12]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iisa52424.2021.9555552","relation":{},"subject":[],"published":{"date-parts":[[2021,7,12]]}}}