{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:11:54Z","timestamp":1772039514337,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/ijcnn48605.2020.9207297","type":"proceedings-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T00:40:33Z","timestamp":1601426433000},"page":"1-8","source":"Crossref","is-referenced-by-count":31,"title":["Is Spiking Secure? A Comparative Study on the Security Vulnerabilities of Spiking and Deep Neural Networks"],"prefix":"10.1109","author":[{"given":"Alberto","family":"Marchisio","sequence":"first","affiliation":[]},{"given":"Giorgio","family":"Nanfa","sequence":"additional","affiliation":[]},{"given":"Faiq","family":"Khalid","sequence":"additional","affiliation":[]},{"given":"Muhammad Abdullah","family":"Hanif","sequence":"additional","affiliation":[]},{"given":"Maurizio","family":"Martina","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Shafique","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Adversarial examples: Opportunities and challenges","volume":"abs 1809 4790","author":"zhang","year":"2018","journal-title":"CoRR"},{"key":"ref32","article-title":"Spiking neural networks, an introduction","author":"vreeken","year":"2003","journal-title":"Technical Report"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553506"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2018.12.002"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3323472"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/72.105415"},{"key":"ref12","article-title":"Adversarial examples in the physical world","author":"kurakin","year":"2017","journal-title":"ICLR Workshop Track"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EIConRus.2017.7910708"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v32i1.11499","article-title":"Towards imperceptible and robust adversarial example attacks against neural networks","author":"luo","year":"2018","journal-title":"AAAI"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(97)00011-7"},{"key":"ref16","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"0","journal-title":"2018 ICLR"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2019.00105"},{"key":"ref18","article-title":"Capsattacks: Robust and imperceptible adversarial attacks on capsule networks","volume":"abs 1901 9878","author":"marchisio","year":"2019","journal-title":"ArXiv"},{"key":"ref19","article-title":"Snn under attack: are spiking deep belief networks vulnerable to adversarial examples?","volume":"abs 1902 1147","author":"marchisio","year":"2019","journal-title":"ArXiv"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRev.81.617"},{"key":"ref4","article-title":"evt_mnist: A spike based version of traditional MNIST","volume":"abs 1604 6751","author":"fatahi","year":"2016","journal-title":"CoRR"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2020.2971217"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2018.112130359"},{"key":"ref6","article-title":"Biasing Restricted Boltzmann Machines to Manipulate Latent Selectivity and Sparsity","author":"goh","year":"2010","journal-title":"NIPS 2010 Workshop on Deep Learning and Unsupervised Feature Learning"},{"key":"ref29","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"0","journal-title":"ICLR 2014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815706"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2202-14-S1-P317"},{"key":"ref7","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"ICLRE"},{"key":"ref2","article-title":"Greedy layer-wise training of deep networks","author":"bengio","year":"0","journal-title":"NIPS 2007"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1126\/science.1127647","article-title":"Reducing the dimensionality of data with neural networks","author":"hinton","year":"2006","journal-title":"Science"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2018.8446003"},{"key":"ref20","article-title":"Weighted contrastive divergence","volume":"abs 1801 2567","author":"merino","year":"2018","journal-title":"CoRR"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(05)80056-5"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1126\/science.1254642","article-title":"A million spiking-neuron integrated circuit with a scalable communication network and interface","author":"merolla","year":"2014","journal-title":"Science"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref23","first-page":"178","article-title":"Real-time classification and sensor fusion with a spiking deep belief network","volume":"7","author":"o\u2019connor","year":"2013","journal-title":"Frontiers in Neuroscience"},{"key":"ref26","article-title":"Are adversarial examples inevitable?","author":"shafahi","year":"0","journal-title":"ICLR 2019"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"409","DOI":"10.55782\/ane-2011-1862","article-title":"Introduction to spiking neural networks: Information processing, learning and applications","volume":"71","author":"ponulak","year":"2011","journal-title":"Acta Neurobiologiae Experimentalis"}],"event":{"name":"2020 International Joint Conference on Neural Networks (IJCNN)","location":"Glasgow, United Kingdom","start":{"date-parts":[[2020,7,19]]},"end":{"date-parts":[[2020,7,24]]}},"container-title":["2020 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9200848\/9206590\/09207297.pdf?arnumber=9207297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T03:53:29Z","timestamp":1723694009000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9207297\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/ijcnn48605.2020.9207297","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}