{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:21:17Z","timestamp":1775665277653,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/ijcnn48605.2020.9207395","type":"proceedings-article","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T20:40:33Z","timestamp":1601412033000},"page":"1-10","source":"Crossref","is-referenced-by-count":4,"title":["Harnessing Adversarial Distances to Discover High-Confidence Errors"],"prefix":"10.1109","author":[{"given":"Walter","family":"Bennette","sequence":"first","affiliation":[]},{"given":"Karsten","family":"Maurer","sequence":"additional","affiliation":[]},{"given":"Sean","family":"Sisti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Foolbox: A python toolbox to benchmark the robustness of machine learning models","author":"rauber","year":"2017"},{"key":"ref11","first-page":"1","article-title":"Adversarial Examples Are Not Bugs, They Are Features","author":"ilyas","year":"2019"},{"key":"ref12","article-title":"On Calibration of Modern Neural Networks","author":"guo","year":"0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1988.10478639"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.32"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.594"},{"key":"ref17","year":"2017","journal-title":"R A Language and Environment for Statistical Computing"},{"key":"ref18","author":"wickham","year":"2017","journal-title":"Tidyverse Easily Install and Load the &#x2019;Tidyverse&#x2019;"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v31i1.10821","article-title":"Identifying Unknown Unknowns in the Open World: Representations and Policies for Guided Exploration","author":"lakkaraju","year":"2017"},{"key":"ref3","article-title":"ConvNets and ImageNet Beyond Accuracy: Explanations, Bias Detection, Adversarial Examples and Model Criticism","author":"stock","year":"2017"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939874"},{"key":"ref5","first-page":"8","article-title":"A Coverage-Based Utility Model for Identifying Unknown Unknowns","author":"bansal","year":"0"},{"key":"ref8","first-page":"1","article-title":"Explaining and Harnessing Adversarial Examples","author":"goodfellow","year":"0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2019.00071"},{"key":"ref2","volume":"1291","author":"sugiyama","year":"2017","journal-title":"Dataset Shift in Machine Learning"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2700832"},{"key":"ref9","first-page":"1","article-title":"Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models","author":"brendel","year":"2017"}],"event":{"name":"2020 International Joint Conference on Neural Networks (IJCNN)","location":"Glasgow, United Kingdom","start":{"date-parts":[[2020,7,19]]},"end":{"date-parts":[[2020,7,24]]}},"container-title":["2020 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9200848\/9206590\/09207395.pdf?arnumber=9207395","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,8]],"date-time":"2023-10-08T13:40:21Z","timestamp":1696772421000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9207395\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ijcnn48605.2020.9207395","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}