{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:13:08Z","timestamp":1729638788214,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/ijcnn.2019.8851795","type":"proceedings-article","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T03:44:32Z","timestamp":1569901472000},"page":"1-8","source":"Crossref","is-referenced-by-count":7,"title":["Curse of Dimensionality in Adversarial Examples"],"prefix":"10.1109","author":[{"given":"Nandish","family":"Chattopadhyay","sequence":"first","affiliation":[]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[]},{"given":"Sourav Sen","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Kasper","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Adversarial spheres","year":"2018","author":"gilmer","key":"ref10"},{"journal-title":"Deep Learning","year":"2016","author":"goodfellow","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198538493.001.0001","author":"bishop","year":"1995","journal-title":"Neural Networks for Pattern Recognition"},{"article-title":"A theoretical framework for robustness of (deep) classifiers under adversarial noise","year":"2016","author":"wang","key":"ref14"},{"article-title":"Foundations of data science","year":"2014","author":"hopcroft","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44503-X_27"},{"article-title":"Statistics. 2007","year":"1978","author":"freedman","key":"ref17"},{"key":"ref18","first-page":"217","article-title":"When is nearest neighbor meaningful?","author":"beyer","year":"1999","journal-title":"International Conference on Database Theory"},{"article-title":"Very deep convolutional networks for large-scale image recognition","year":"2014","author":"simonyan","key":"ref19"},{"article-title":"Intriguing properties of neural networks","year":"2013","author":"szegedy","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1037\/h0042519"},{"article-title":"Transferability in machine learning: from phenomena to black-box attacks using adversarial samples","year":"2016","author":"papernot","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3134599"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"goodfellow","key":"ref8"},{"key":"ref7","article-title":"Adversarial attacks and defences: A survey","author":"chakraborty","year":"2018","journal-title":"CoRR"},{"key":"ref2","volume":"1","author":"friedman","year":"2001","journal-title":"The Elements of Statistical Learning"},{"key":"ref1","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"article-title":"High dimensional spaces, deep learning and adversarial examples","year":"2018","author":"dube","key":"ref9"},{"key":"ref20","article-title":"Mnist handwritten digit database","volume":"2","author":"lecun","year":"2010","journal-title":"AT&T Labs"},{"article-title":"Adversarial machine learning at scale","year":"2016","author":"kurakin","key":"ref22"},{"article-title":"The cifar-10 dataset","year":"2014","author":"krizhevsky","key":"ref21"},{"article-title":"cleverhans v2. 0.0: an adversarial machine learning library","year":"2016","author":"papernot","key":"ref24"},{"article-title":"Boosting adversarial attacks with momentum","year":"2017","author":"dong","key":"ref23"}],"event":{"name":"2019 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2019,7,14]]},"location":"Budapest, Hungary","end":{"date-parts":[[2019,7,19]]}},"container-title":["2019 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8840768\/8851681\/08851795.pdf?arnumber=8851795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T08:57:01Z","timestamp":1721811421000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8851795\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2019.8851795","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]}}}