{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T16:14:14Z","timestamp":1769271254626,"version":"3.49.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/ijcnn48605.2020.9207472","type":"proceedings-article","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T20:40:33Z","timestamp":1601412033000},"page":"1-6","source":"Crossref","is-referenced-by-count":31,"title":["On Adversarial Examples and Stealth Attacks in Artificial Intelligence Systems"],"prefix":"10.1109","author":[{"given":"Ivan Y.","family":"Tyukin","sequence":"first","affiliation":[]},{"given":"Desmond J.","family":"Higham","sequence":"additional","affiliation":[]},{"given":"Alexander N.","family":"Gorban","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","author":"gorban","year":"1996","journal-title":"Neural Networks on Personal Computer"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"947","DOI":"10.1038\/35016072","article-title":"Digital selection and analogue amplification coexist in a cortex-inspired silicon circuit","volume":"405","author":"hahnloser","year":"2000","journal-title":"Nature"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.07.040"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/PGEC.1965.264137"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1137\/18M1165748"},{"key":"ref10","article-title":"Deep learning: A critical appraisal","author":"marcus","year":"2018","journal-title":"arXiv 1801 00631 [cs AI]"},{"key":"ref11","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"arXiv preprint arXiv 1312 6199"},{"key":"ref12","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2016.0132"},{"key":"ref14","first-page":"162","article-title":"The debate about algorithms","author":"davenport","year":"2017","journal-title":"Mathematics Today"},{"key":"ref15","article-title":"Adversarial examples in the physical world","author":"kurakin","year":"2016","journal-title":"arXiv preprint arXiv 1607 02533"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00930"},{"key":"ref18","article-title":"Square attack: a query-efficient black-box adversarial attack via random search","volume":"abs 1912 49","author":"andriushchenko","year":"2019","journal-title":"CoRR"},{"key":"ref19","first-page":"2017","article-title":"Adversarial examples that fool detectors","volume":"abs 1712 2494","author":"lu","year":"0","journal-title":"CoRR"},{"key":"ref28","article-title":"Are adversarial examples inevitable?","author":"shafahi","year":"2019","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-019-1799-6"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1038\/nature16961","article-title":"Mastering the game of Go with deep neural networks and tree search","volume":"2529","author":"silver","year":"2016","journal-title":"Nature"},{"key":"ref29","article-title":"Understanding deep learning requires rethinking generalization","author":"zhang","year":"2017","journal-title":"International Conference on Learning Representations"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-30390-0"},{"key":"ref8","article-title":"End to end learning for self-driving cars","author":"bojarski","year":"2016","journal-title":"arXiv preprint arXiv 1604 07316"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-20521-y"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1201\/9781315382159","author":"rogers","year":"2016","journal-title":"A First Course in Machine Learning"},{"key":"ref9","article-title":"Robust physical-world attacks on machine learning models","volume":"abs 1707 8945","author":"evtimov","year":"2017","journal-title":"CoRR"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref22","first-page":"854","article-title":"Parseval networks: Improving robustness to adversarial examples","volume":"70","author":"cisse","year":"2017","journal-title":"Proceedings of the 34th International Conference on Machine Learning ser Proceedings of Machine Learning Research"},{"key":"ref21","article-title":"One pixel attack for fooling deep neural networks","author":"su","year":"2017","journal-title":"arXiv 1710 08864 [cs LG]"},{"key":"ref24","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","author":"athalye","year":"2018","journal-title":"arXiv preprint arXiv 1802 00420"},{"key":"ref23","article-title":"Provable robustness of ReLU networks via maximization of linear regions","volume":"abs 1810 7481","author":"croce","year":"2018","journal-title":"CoRR"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3134599"},{"key":"ref25","article-title":"Provable robustness against all adversarial lp-perturbations for p greater than or equal to one","author":"croce","year":"2020","journal-title":"International Conference on Learning Representations"}],"event":{"name":"2020 International Joint Conference on Neural Networks (IJCNN)","location":"Glasgow, United Kingdom","start":{"date-parts":[[2020,7,19]]},"end":{"date-parts":[[2020,7,24]]}},"container-title":["2020 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9200848\/9206590\/09207472.pdf?arnumber=9207472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T01:21:30Z","timestamp":1668993690000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9207472\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/ijcnn48605.2020.9207472","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}